Security Operations , Security Operations Center (SOC)

Using Automation to Update a SOC

3 Experts Discuss Role of XDR, Review Key Steps
From left: Sean Duca, Rishi Rajpal and Anish Ravindranathan

How can organizations update their SOCs to ensure they keep up with evolving cyberthreats? Three experts - Sean Duca of Palo Alto Networks, Anish Ravindranathan of Tata Digital and Rishi Rajpal of Concentrix - offer insights.

See Also: Building Better Security Operations Centers With AI/ML

In a video interview with Information Security Media Group, the panelists discuss:

  • How XDR - Extended Detection and Response - improves SOC capability;
  • How to design a SOC to address today's threat landscape;
  • Which SOC functions should be automated.

Duca is the vice president and regional chief security officer for the Asia-Pacific region and Japan at Palo Alto Networks. Previously, he spent 15 years in a variety of roles at Intel Security, most recently as CTO for the Asia-Pacific region.

Rajpal is vice president of global security at Concentrix. He has more than 20 years of global experience in information security, with a specialization in risk management, security tools and technologies, compliance and privacy.

Ravindranathan is a security architect at Tata Digital. He directs his team through tactical response procedures to prioritize, detect, analyze and investigate cybersecurity incidents. He previously led cybersecurity incident response at General Mills.


About the Author

Suparna Goswami

Suparna Goswami

Associate Editor, ISMG

Goswami has more than 10 years of experience in the field of journalism. She has covered a variety of beats including global macro economy, fintech, startups and other business trends. Before joining ISMG, she contributed for Forbes Asia, where she wrote about the Indian startup ecosystem. She has also worked with UK-based International Finance Magazine and leading Indian newspapers, such as DNA and Times of India.




Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing govinfosecurity.com, you agree to our use of cookies.