News
Topics
Features
Webinars
White Papers
Podcasts
Events
Events & Conferences
Directory
Infosecurity Magazine Home
»
Webinars
»
#IMOS18 - How To: Run a SOC (How to build and run a security operations center to improve security posture )
#IMOS18 - How To: Run a SOC (How to build and run a security operations center to improve security posture )
Webinar
21:45 —
22:15, 12 September 2018
Speakers
David Horton
information security manager, GSK
Dan Raywood
Email Dan
Follow @DanRaywood
Connect on LinkedIn
Why Not Watch?
#IMOS18 - Dissecting Blockchain for the Practical Application to Identity
19:45 —
20:15, 12 September 2018
#IMOS18 - Advancements in Authentication: How Have Evolutions in Biometrics, Multi-Factor & Standards Changed the Authentication Landscape?
22:30 —
23:30, 12 September 2018
Transforming the Security Operations Centre with Google Scale Analytics
18:00 —
18:30, 21 October 2021
#IMOS18 - Time to Stop Blaming the User: Making Security Usable
20:30 —
21:30, 12 September 2018
You may also like
Data Theft Overtakes Ransomware as Top Concern for IT Decision Makers
News
2 October 2023
The SOC of the Future
Magazine Feature
16 June 2022
How to Build an Autonomic Security Operations Center (SOC)
Opinion
22 February 2022
AI: End of the SOC as We Know It vs. A SOC That's Staying Put
Magazine Feature
26 November 2021
EU Opens Applications for Cybersecurity and Digital Skills Funding
News
5 July 2024
What’s Hot on Infosecurity Magazine?
Read
Shared
Watched
Editor's Choice
US To Leave Global Forum on Cyber Expertise
News
8 January 2026
1
Gartner Calls For Pause on AI Browser Use
News
9 December 2025
2
Europol Leads Global Crackdown on Black Axe Cybercrime Gang, 34 Arrested
News
9 January 2026
3
World Economic Forum: Deepfake Face-Swapping Tools Are Creating Critical Security Risks
News
9 January 2026
4
AI-Powered Truman Show Operation Industrializes Investment Fraud
News
9 January 2026
5
FBI Warns of North Korean QR Phishing Campaigns
News
9 January 2026
6
Cyber-Attack Disrupts OnSolve CodeRED Emergency Notification System
News
26 November 2025
1
MFA Failure Enables Infostealer Breach At 50 Enterprises
News
7 January 2026
2
Infosecurity's Top 10 Cybersecurity Stories of 2025
News
1 January 2026
3
Personal LLM Accounts Drive Shadow AI Data Leak Risks
News
7 January 2026
4
UK Launches New Cyber Unit to Bolster Defences Against Cyber Threats
News
6 January 2026
5
Ghost Tap Malware Fuels Surge in Remote NFC Payment Fraud
News
7 January 2026
6
Revisiting CIA: Developing Your Security Strategy in the SaaS Shared Reality
Webinar
15:00 —
16:00, 11 December 2025
1
Exposing AI’s Blind Spots: Security vs Safety in the Age of Gen AI
Webinar
12:30 —
13:30, 13 November 2025
2
Risk-Based IT Compliance: The Case for Business-Driven Cyber Risk Quantification
Webinar
15:00 —
16:00, 23 October 2025
3
How Mid-Market Businesses Can Leverage Microsoft Security for Proactive Defenses
Webinar
15:00 —
16:00, 6 November 2025
4
Cyber Defense in the Age of AI: Stay Ahead of Threats Without Compromising Safety
Webinar
15:00 —
16:00, 24 July 2025
5
Mastering Identity and Access for Non-Human Cloud Entities
Webinar
14:00 —
16:00, 18 September 2025
6
Regulating AI: Where Should the Line Be Drawn?
Opinion
12 November 2025
1
What Is Vibe Coding? Collins’ Word of the Year Spotlights AI’s Role and Risks in Software
News Feature
11 November 2025
2
Risk-Based IT Compliance: The Case for Business-Driven Cyber Risk Quantification
Webinar
15:00 —
16:00, 23 October 2025
3
Bridging the Divide: Actionable Strategies to Secure Your SaaS Environments
Blog
7 November 2025
4
NCSC Set to Retire Web Check and Mail Check Tools
News
10 November 2025
5
Beyond Bug Bounties: How Private Researchers Are Taking Down Ransomware Operations
Podcast
4 November 2025
6