Cisco Secure’s J. Wolfgang Goerlich: Rebuilding Trust in Security Tools
Jan 3, 2022
Why is SIEM an area of unease for so many security officers?
To make detection and response successful, we need tools capable of upscaling the practitioners as well as equipping them to be successful. We need tools we can rely on.
In today's episode, we had an inspiring conversation with J Wolfgang Goerlich, Advisory CISO at Cisco Secure. We discussed how trust is a determinant factor in building the security tools of the future, why so many CISOs lost trust over SIEMs and what we can do to rebuild it.
Topics discussed in this episode:
Wolf's role as advisory CISO.
How we can use technology to solve business problems
How CISOs perceive SIEMs today and security monitoring as a practice
The investigative side versus the detection side of SIEMs
How the detection personas have changed with the movement to the cloud
Challenges of doing detection in the modern day
The story of when Wolf worked in an open source project
How Wolf advises CISOs on making a build versus buy decision
How detection and response will evolve in the coming years
3 pieces of actionable advice to succeed with building effective detection programs at scale
By continuing to use this website you consent to our use of cookies.
Functional
Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes.The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.