101 Guide To Security Automation

Cyber Security Digital Summit Fall 2019

In this Cyber Security Digital Summit session, learn how to eliminate bottlenecks that plague traditional change processes, decrease errors by standardizing more areas of their security, and support the dynamic demands of their agile/DevOps customers

We respect your privacy, by clicking ‘Watch On Demand’ you agree to receive our e-newsletter, including information on Podcasts, Webinars, event discounts and online learning opportunities. For further information on how we process and monitor your personal data click here. You can unsubscribe at anytime.

This FREE webinar was recorded on:
November 13, 2019
11:30 AM - 12:15 PM EST

If you are dealing with too many manual changes processes, burdening an overworked staff, this session is a must-attend for you. You’ll learn how to use security automation to reduce the opportunities for mistakes and misconfigurations by taking the drudge work off your staff and fast-tracking traditional SecOps.

Key takeaways: 

  • Eliminate bottlenecks that plague traditional change processes
  • Decrease errors by standardizing more areas of their security
  • Support the dynamic demands of their agile/DevOps customers

Tim Woods, VP, Technology Alliance, FireMon

Host:

Jeff Orr
Editor In Chief
Cyber Security Hub

Jeff Orr is a veteran technology strategist, conference producer, and industry analyst passionate about the way people interact with systems and machines through emerging technologies and new user experiences. At Cyber Security Hub, he oversees all editorial direction of its complete portfolio of online products -- as well as engages a network of esteemed industry board members, analysts and key influencers to make CSHub a renowned resource for all things cyber security. Jeff was actively involved in the development and launch of industry-first products, including Wi-Fi and 4G solutions, and leading the wireless strategy for a Fortune 100 entertainment company. His research on emerging technologies includes AI, cyber security, Industrial IoT (IIoT), mobile computing, wearables, and user interfaces.

We respect your privacy, by clicking ‘Watch On Demand’ you agree to receive our e-newsletter, including information on Podcasts, Webinars, event discounts and online learning opportunities. For further information on how we process and monitor your personal data click here. You can unsubscribe at anytime.