Find out what's inside the December 2021 edition of the Journal & download a free copy of this month's featured article
- This event has passed so registration is closed.
High-performing SOCs are aligned with organizational needs and deliver actionable business value, but leaders need to have sufficient talent, tools and technology in place to be successful. Analyst burnout continues to be a challenge in the industry. According to the Devo SOC Performance Report 78% of personnel say that working in the SOC is painful. CISOs have a responsibility to reduce the stress and pain that come with working in a SOC to ultimately improve retention and effectiveness.
Join this webinar and hear industry experts discuss strategies to:
• Identify common areas of analyst turnover and burnout
• Share recommendations for improving the culture of the SOC
• Learn measurements to validate improvements in SOC effectiveness
Ken Dunham – Principal Consultant, Global Security Consulting Services
Ken Dunham brings more than 30 years of business, technical and leadership experience in cyber security, incident response and cyber threat intelligence. He is very active in his visionary and leadership roles with World Wide Technology, Optiv, 4D5A Security, and Rampart Research. Mr. Dunham has a long history of innovation and highly successful ventures related to anti-virus, incident response, forensics, Darknet intelligence operations, responsible disclosure, and cyber-threat intelligence. He is also proud to have served the USAF as a contractor for innovation of new training solutions for U-2, Warthog, and Predator programs for pilots and navigators. Mr. Dunham also authored the 2015 ISSA article of the year, “Troubling Trends of Espionage”, has authored multiple books and thousands of computer security articles.
Mr. Dunham founded the Boise ISSA chapter and has been an active officer of ISSA since 2001. The Boise ISSA chapter also orchestrates a very successful annual Information Security conference. Mr. Dunham also serves as an ISSA Journal mentor. Ken Dunham has also been instrumental in other cyber security groups of the industry as a founder of the Idaho InfraGard chapter (FBI) and member/officer of groups like HTCIA and ISACA.
Jason has more than 30 years of experience in telecommunications fraud prevention, physical security management and cyber security investigations. During his career, he has developed and implemented overall cyber security, physical security, forensic investigation and fraud control programs for several global organizations and managed lawful interception operations to support federal agencies. He has developed security and fraud awareness training seminars for employees in private industry, as well as federal, state and local law enforcement.
Steve Cobb – Executive CyberSecurity Advisor, IBM
Steve Cobb is One Source’s Chief Information Security Officer (CISO) bringing more than 25 years of leadership consulting surrounding IT infrastructure, cybersecurity, incident response, and cyber threat intelligence. Since joining One Source in 2015, Steve has been responsible for providing strategic IT consulting, delivering an increased organization efficiency and security for our customers. Prior to One Source, he was a Senior Security Engineer with Verizon Managed Security and a Senior Escalation Engineer with Microsoft. Steve serves on several CISO boards and a frequent presenter at conferences such as InfoSecCon, Cyber Defense Summit, and others. Steve attended UNC-CH, but left early to start his own IT company, and ultimately received his degree in Business from East Carolina University. Steve and his wife have two daughters and a son.
Nia Luckey – Extended Board of Advisers, Fayetteville Technical Community College
As an innovator and creator, I acknowledge obstacles and focus on opportunities for growth and holistic solutions. By enveloping transparency to break down communication barriers, the teams I support can step back, reassess, and move forward. My focus is on asking the question, “What does yes look like?” and leveraging my studies of Defense Acquisitions with concentrations in IT and Program management to drive innovation and automation forward in the programs and cloud services I support.
ISSA Webinars and Conference series cover all the continuing education credits to maintain your cyber security certifications. (CPEs, CEUs, ECE, etc). Each hour is equal to one continuing education credit. Certificates of completion are available upon request after completion. For instructions, click here.