1. Moscone West | 2011 Table F

With the increasing velocity and volume of cyberattacks, coupled with the lack of sufficiently trained staff, it is essential that detection and response activities are automated as much as possible. Join us for a peer-to-peer discussion exploring best practices for the automation and orchestration of security operations. Attendance is strictly limited to allow for a small group experience.

Participants: