News
Topics
Features
Webinars
White Papers
Podcasts
Events
Events & Conferences
Directory
Infosecurity Magazine Home
»
Webinars
»
#IMOS18 - How To: Run a SOC (How to build and run a security operations center to improve security posture )
#IMOS18 - How To: Run a SOC (How to build and run a security operations center to improve security posture )
Webinar
12 Sep 2018
Speakers
David Horton
information security manager, GSK
Dan Raywood
Email Dan
Follow @DanRaywood
Connect on LinkedIn
Why not watch?
Transforming the Security Operations Centre with Google Scale Analytics
21 Oct 2021
#IMOS18 - Time to Stop Blaming the User: Making Security Usable
12 Sep 2018
#IMOS18 - Advancements in Authentication: How Have Evolutions in Biometrics, Multi-Factor & Standards Changed the Authentication Landscape?
12 Sep 2018
#IMOS18 - CISO Interview; Heath Renfrow, Leo Cybersecurity
12 Sep 2018
You may also like
Data Theft Overtakes Ransomware as Top Concern for IT Decision Makers
News
2 Oct 2023
The SOC of the Future
Magazine Feature
16 Jun 2022
How to Build an Autonomic Security Operations Center (SOC)
Opinion
22 Feb 2022
AI: End of the SOC as We Know It vs. A SOC That's Staying Put
Magazine Feature
26 Nov 2021
EU Opens Applications for Cybersecurity and Digital Skills Funding
News
5 Jul 2024
What’s hot on Infosecurity Magazine?
Read
Shared
Watched
Editor's Choice
Top 10 Cyber-Attacks of 2024
News Feature
2 Dec 2024
1
FIN7 Gang Hides Malware in AI “Deepnude” Sites
News
3 Oct 2024
2
CISA Urges Encrypted Messaging After Salt Typhoon Hack
News
20 Dec 2024
3
Ukraine's Security Service Probes GRU-Linked Cyber-Attack on State Registers
News
20 Dec 2024
4
New Malware Can Kill Engineering Processes in ICS Environments
News
19 Dec 2024
5
Ransomware Attackers Target Industries with Low Downtime Tolerance
News
20 Dec 2024
6
Cybercriminals Exploit Google Calendar to Spread Malicious Links
News
17 Dec 2024
1
New APIs Discovered by Attackers in Just 29 Seconds
News
17 Dec 2024
2
US Organizations Still Using Kaspersky Products Despite Ban
News
19 Dec 2024
3
Texas Tech University Data Breach Impacts 1.4 Million
News
17 Dec 2024
4
New Malware Can Kill Engineering Processes in ICS Environments
News
19 Dec 2024
5
Phishing Attacks Double in 2024
News
18 Dec 2024
6
Alert Fatigue: What Are You and Your Security Teams Missing?
Webinar
5 Dec 2024
1
Dispelling the Myths of Defense-Grade Cybersecurity
Webinar
4 Dec 2024
2
How to Manage Your Risks and Protect Your Financial Data
Webinar
30 Oct 2024
3
New Cyber Regulations: What it Means for UK and EU Businesses
Webinar
10 Oct 2024
4
The Future of Fraud: Defending Against Advanced Account Attacks
Webinar
18 Jul 2024
5
Learn Key Strategies for Industrial Data Security
Webinar
27 Jun 2024
6
Gatwick Airport's Cybersecurity Chief on Supply Chain Risks and CrowdStrike Outage
Interview
21 Nov 2024
1
You're Hired! The Truth About Certifications in Cybersecurity Careers
News Feature
2 Dec 2024
2
T-Mobile Claims Salt Typhoon Did Not Access Customer Data
News
28 Nov 2024
3
Darknet Services Fuel Holiday Scams and E-Commerce Exploits
News
26 Nov 2024
4
Top 10 Cyber-Attacks of 2024
News Feature
2 Dec 2024
5
Google Deindexes Chinese Propaganda Network
News
25 Nov 2024
6