The Great Cybersecurity Automation Debate

Watch Now

To watch this webinar you’ll need an Infosecurity Magazine account. Log in or sign up below.

Log in
Sign up

Get up-to-the-minute news and opinions, plus access to a wide assortment of Information Security resources that will keep you current and informed.

This will be used to identify you if you take part in our online comments.

Your password should:

  • be at least eight characters long
  • be no more than 25 characters long
  • contain at least one uppercase, lowercase and special character
  • contain at least one digit
  • only contain alphanumeric characters or ~!@#$%^&*()_-+=?.

For more information explaining how we use your information please see our privacy policy.

By registering you agree with our terms and conditions.

The debate about automating cybersecurity operations has raged for many years now, with varying views on the extent of the role these technologies can play. Amid surging cyber-attacks, the need for automation in areas like threat detection and response has never been stronger. However, implementing these technologies effectively is another matter entirely.
 
Automating menial and repetitive tasks is common, but means incurring development overheads, resulting in teams having to maintain a wild motley collection of scripts and code. Additionally, tools like anti-spam, intrusion protection systems, or security, operations, automation, and response (SOAR) solutions, have often led to usability issues, blocking legitimate activities. 
 
In this session, a panel of experts will highlight the current state of automation in cybersecurity and offer best practice advice on how to utilize existing technologies.  
 
Tune in to hear:

  • Lessons learned from automation, past and present
  • What to automate and when to keep the human in the loop
  • How advances in machine learning and AI can help with better automation

Speakers

Photo of Richard Cassidy

Richard Cassidy

Vice President of Global Technology, Securonix

Photo of James Coker

James Coker

Deputy Editor, Infosecurity Magazine

Photo of Oliver Rochford

Oliver Rochford

Applied Research Director- Threat Science Team, Securonix

Brought to you by

Should you watch this webinar your information may be shared with the sponsors indicated above. Please see the privacy policy for Securonix here: https://www.securonix.com/privacy-policy/. Please see Infosecurity Magazine’s privacy policy for more information.