Fraud Management & Cybercrime , Security Operations , Security Operations Center (SOC)

SOC of the Future: Bringing Order to Chaos

Bruce Hembree of Palo Alto Networks Discusses New Strategies and Solutions
Bruce Hembree, Field CTO Cortex, Palo Alto Networks

The volume and sophistication of security attacks increase at a rate that makes it tough for SOCs to have people, processes and technologies in their right places. So what would the ideal SOC look like? Bruce Hembree of Palo Alto Networks discusses the way forward.

See Also: The Fraudster's Journey - Fraud in the IVR

In a video interview with Information Security Media Group, Hembree discusses:

  • Where to find the right people to build your SOC;
  • Do you build a SOC or do you buy a managed security service provider?;
  • How critical machine learning is to a SOC's success.

Hembree is the Palo Alto Networks Cortex Field Chief Technology Officer for North and South America. Prior to Palo Alto Networks, he worked extensively with the Department of Defense and served as Security Operations Manager at the Microsoft Digital Crimes Unit. He is a veteran of the United States Air Force and spent two years deployed to active conflict areas in support of global anti-terrorism efforts.

To learn more about this upcoming roundtable, please visit the registration page.


About the Author

Nick Holland

Nick Holland

Director, Banking and Payments

Holland, an experienced security analyst, has spent the last decade focusing on the intersection of digital banking, payments and security technologies. He has spoken at a variety of conferences and events, including Mobile World Congress, Money2020, Next Bank and SXSW, and has been quoted by The Wall Street Journal, CNN Money, MSNBC, NPR, Forbes, Fortune, BusinessWeek, Time Magazine, The Economist and the Financial Times. He holds an MSc degree in information systems management from the University of Stirling, Scotland.




Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing govinfosecurity.com, you agree to our use of cookies.