Defending the Digital Perimeter: Modern Cybersecurity for SOC

You are here:
Date: June 20, 2025
Time: 10:00 AM EDT | 9:00 AM CDT | 7:30 PM IST

Topic: Defending the Digital Perimeter: Modern Cybersecurity for SOC

Register

Abstract: In the current threat landscape, where cyber threats are evolving rapidly, proactive network security is desperately needed to prevent and reduce the impact of cyber incidents. Blue teaming and cyber defense incorporate how organizations identify, detect, prevent, and mitigate cyber threats and vulnerabilities. While traditional approaches to security operations have been reactive to threats, the ever-changing nature of the threat landscape requires that organizations shift to more proactive methods. This webinar series is dedicated to understanding proactive cyber defense strategies and how to build an effective blue team program. In today’s session, we will dive into the world of the Security Operations Center and learn how organizations can effectively manage cybersecurity incidents and exposures.

Key Takeaways: 

  • Components of an effective Security Operations Center
  • Techniques and KPIs for ensuring effective monitoring and incident response
  • Integrating Vulnerability and Exposure Management into the SOC
  • Strategies for effective response and recovery
  • Developing effective exercises to ensure continuous improvement

Speaker:

Andrew Jarrett, Director, Cyber Monitoring & Incident Response, Depository Trust & Clearing Corporation (DTCC) 

Bio: Andrew Jarrett has over fifteen years of experience in technology, cybersecurity, and incident response in both the public and private sectors. Prior to joining DTCC, Andrew Jarrett launched and led multiple cybersecurity programs in highly regulated environments, including defense and finance. In addition to his work at DTCC, Andrew Jarrett is also an adjunct instructor with the Applied Cybersecurity Program at Texas A&M Engineering Extension Service and a volunteer advisor for multiple high school and college career technology education programs.

Share this Article
Facebook
Twitter
LinkedIn
WhatsApp
Pinterest
You may also like

Train with EC-Council

Cyber Talks
Recent Posts