WATCH OUR SUMMIT TO LEARN FROM LEADING CYBER SECURITY EXPERTS

This one-day virtual event in collaboration with Microsoft focuses on cloud security transformation. It is designed to inspire security operations leaders to future-proof and optimize their SOC.

CyberProof's highly experienced team joins forces with industry influencers to lead five sessions that dive into the most pressing issues facing our industry including the critical components of a modern SOC, leveraging threat hunting and threat intelligence during ransomware attacks and adapting your detection and response workflows to keep pace with the changing landscape.

EVENT SCHEDULE

SESSION 1

DRIVING THE NEXT GENERATION OF CLOUD SECURITY TRANSFORMATION

Speakers: Saggie Haim , Cloud Security Solutions Architect Team Leader & Ken Malcolmson, Chief Security Advisor, Microsoft

How can organizations adopt cloud-native cyber defense without the complexity and costs associated at two distinct stages of the transformation journey (migrating from legacy systems to Azure Sentinel or already invested in Microsoft Security stack but need to optimize)?

In this session, Microsoft's CSA Ken Malcolmson and CyberProof's Cloud Security Solutions Architect Team Leader Saggie Haim will discuss cloud security transformation, including: cloud-native vs on-premises and cloud-based, and key priorities when securing multi-cloud environments.

Watch Here

 

SESSION 2

THE PILLARS OF A MODERN SOC

Speakers: Tony Velleca, CEO, CyberProof & Bruce Roton, VP of Strategy, CyberProof

Security operations has become more difficult than ever before as rapid changes to business’ IT infrastructure create new attack surfaces. Security teams are being pressured to optimize and future-proof their cyber defense architecture, so in what should you prioritize your investments as you evolve your cyber defense architecture?

In this session, CyberProof’s CEO Tony Velleca and VP of Strategy Bruce Roton outline the key pillars of a modern SOC that will allow you to adapt as your business and threat landscape conditions change, including: cloud-native security monitoring infrastructure to scale to big data requirements of enterprises, adapting to new threats in an agile way with the Use Case Factory model, enabling collaboration between specialist teams in the SOC, and how bots can enable humans.

Watch Here

 

SESSION 3

UNDERSTANDING THE RANSOMWARE THREAT

Speakers: Roee Laufer, Head of SOC Operations, CyberProof & Yuval Wollman, President, CyberProof

Ransomware continues to be one of the most damaging forms of cyber crime being used by threat actors, but their approach has been changing in recent years. It is therefore crucial to understand how these attacks are executed and what subsequent measures should be taken. We have created a special simulation to show you how easy it is to fall victim to ransomware and will provide some best practices to help you prepare.

Watch Here

 

SESSION 4

RESPONDING TO RANSOMWARE: HOW TO LEVERAGE THREAT INTELLIGENCE AND THREAT HUNTING

Speakers: Asaf Haski, Senior Cyber Threat Intelligence (CTI) Analyst, CyberProof & Karina Daniel, Cyber Threat Hunter, CyberProof

How do the threat hunting team and the Cyber Threat Intelligence (CTI) team collaborate in real time during a ransomware attack? What are the key points that need to be investigated and what process is taken to obtain answers quickly when time is short?

In this session, we’ll look at how these two expert teams at CyberProof worked together in a recent ransomware incident to quickly get to the root of questions such as: What was the initial attack vector used? Was the exfiltration accomplished? Do the threat actors still have access to the network? Learn more in this session by CyberProof’s Asaf Haski, Senior Cyber Threat Intelligence Analyst, and Karina Daniel, Cyber Threat Hunter.

Watch Here

 

SESSION 5

ADAPTING YOUR CYBER DEFENSE TO THE EVER-CHANGING THREAT LANDSCAPE

Speakers: Christopher Schrauf, Security Information and Event Management (SIEM) Solution Architect CyberProof

To stay ahead of the ever-changing threat landscape, security teams need a way to continuously tune their threat detection and response capabilities. In this session, we’ll introduce an agile methodology that can be used to understand your current threat coverage and adapt detection and response workflows as your business and threat conditions change.

Watch Here

 

MEET OUR SPEAKERS

SAGGIE HAIM

  • Cloud Security Team Leader
  • CyberProof

TONY VELLECA

  • CEO
  • CyberProof

KEN MALCOLMSON

  • Chief Security Advisor
  • Microsoft

BRUCE ROTON

  • VP
  • Global Head of Security Strategy
  • CyberProof

ROEE LAUFER

  • Head of SOC Operations
  • CyberProof

YUVAL WOLLMAN

  • President
  • CyberProof

KARINA DANIEL

  • Cyber Threat Hunter
  • CyberProof

ASAF HASKI

  • Snr. Cyber Threat Intelligence
  • (CTI) Analyst
  • CyberProof

 

CHRISTOPHER SCHRAUF

  • Security Information and
    Event Management (SIEM)
    Solution Architect
  • CyberProof

FAQS

What will I learn in the SOC Masterclass?

We’ll share insights and deep dive into how cyber threats are rapidly evolving an ever-changing digital landscape.

SOC experts will demonstrate what global organizations and security leaders must do to achieve maximum cyber defense and operational efficiency.

From cloud security transformation to better understanding ransomware threats, we will provide solid tactics to better optimize your SOC, so make sure you reserve your spot today!

What will be the main topics in the SOC Masterclass?

Security experts will conduct a deep-dive analysis on how to optimize SOC operations for faster, more effective incident detection and response.

Here’s a peek into what you will learn:

  • Cloud Security Transformation
  • The pillars of a modern SOC
  • Identifying your Threat Exposures in an Effective Way
  • Adapting your Cyber Defense to the Ever-Changing Threat Landscape
  • Understanding the Ransomware Threat
Is this event really free?

Absolutely! CyberProof and Microsoft will share insights and knowledge free of charge - we hope you’ll find it useful.

Why do I need to fill out personal information to sign up?

We will always keep your personal information safe. We ask for your information in exchange for receiving a valuable resource – and in order to send more information that we think may be of interest to you in the future.

Will there be a recording of the entire event?

Yes! We will share a recorded and edited version of the entire webinar via email so make sure you insert your contact info correctly. We’ll also follow up with dedicated content summarizing the entire event.