In order to sign in, enter the email address you used to registered for the event. Once completed, you will receive an email with a verification link. Open this link to automatically sign into the site.
Register For Cube365 Events Platform
Please fill out the information below. You will recieve an email with a verification link confirming your registration. Click the link to automatically sign into the site.
I want my badge and interests to be visible to all attendees.
Checking this box will display your presense on the attendees list, view your profile and allow other attendees to contact you via 1-1 chat. Read the Privacy Policy. At any time, you can choose to disable this preference.
MK Palmore of Apogee Global RMS is founder and principal advisor and brings decades of federal and private sector cybersecurity experience, including 32 years in US government service and leadership roles at Palo Alto Networks and Google Cloud. Jon Oltsik of theCUBE Research hosts the Cybersecurity Bridge podcast and interviews Palmore on mid-market cybersecurity strategy, artificial intelligence adoption and risk management.The conversation examines Zero Trust fundamentals, managed security service providers and managed detection and response, fractional virtual chief information security officer models, practical artificial intelligence use cases for security operations centers, and governance risk and compliance considerations. Topics also cover identity and access management and Center for Internet Security controls, security operations center operations and public private information sharing.Key takeaways include Palmore's emphasis on returning to cybersecurity fundamentals as strategic priorities. They recommend that small and medium-sized businesses partner with managed security service providers and managed detection and response providers and adopt fractional virtual chief information security officer leadership. Oltsik and they advise that artificial intelligence is most effective as an augmenting tool for security operations center triage, alert enrichment and workflow automation, and that organizations establish governance risk and compliance processes, conduct risk assessment, and pursue public private information sharing.
Vlad Babiuk of Stellar Cyber, director of technical product marketing, joins Jon Oltsik of theCUBE Research on The Cybersecurity Bridge to examine security operations, artificial intelligence referred to as AI, open extended detection and response referred to as XDR, autonomous security operations centers referred to as SOC, telemetry strategies and market consolidation. The discussion highlights AI-native and autonomous SOC architectures, unified data pipelines and identity-aware telemetry as critical factors for modern threat detection and response.Babiuk draws on product marketing and operational experience to explore data pipelines, agentic architectures and identity context and to explain how AI reshapes threat detection, investigation and response workflows. They emphasize open telemetry and unified data pipelines as essential for accurate AI-driven detection and investigation. Oltsik observes that autonomous SOCs change analyst roles and create demand for AI-aware skills while managed security service providers and managed detection and response providers can leverage automation to scale more efficiently.
This episode of The Cybersecurity Bridge examines the reinvention of network security through enhanced visibility, artificial intelligence and the evolving role of network detection and response. The discussion highlights how telemetry, detection engineering and automation reshape threat detection and incident response in modern environments.Brian Dye of Corelight joins host Jon Oltsik of theCUBE Research to explore modern network detection and response, AI-driven security operations center automation and data-driven visibility, including the evolution of Zeek and Suricata. Dye provides insight on Corelight's Polaris program and on how network telemetry supports investigations and model-driven defenses; they emphasize pragmatic operational approaches and measurable data practices.The conversation explores threat trends and how comprehensive network visibility fuels investigations and automated defenses. Dye emphasizes that organizations should map and automate two priority security operations center processes first and that they treat data coverage and retention as first-class metrics. Oltsik and other analysts emphasize federated AI integrations and pragmatic automation over perfection. Watch for practical factors to consider when improving detection, response and SOC efficiency.
In this episode of the Cybersecurity Bridge podcast, Dale Hoak, chief information security officer of RegScale, joins Jon Oltsik, principal analyst in residence of theCUBE Research, to examine practical operational priorities in modern cybersecurity. The conversation explores artificial intelligence, or AI, driven governance, risk and compliance, or GRC, automation, threat intelligence, API security, fusion centers and FedRAMP modernization with emphasis on operational controls assurance and audit readiness.Hoak emphasizes a practicality over theory philosophy and the value of curated threat intelligence rather than raw volume. They recommend automating GRC and implementing continuous controls monitoring to maintain audit readiness. They advise embedding DevSecOps and AI software bill of materials, or SBOM, practices to support responsible AI development. They also counsel investment in skills such as prompt engineering and GRC engineering to keep pace with an expanding attack surface.Listen for actionable guidance on threat intelligence, API security, FedRAMP adoption and continuous controls assurance. This episode benefits security leaders responsible for compliance, risk management and cloud security who seek pragmatic strategies for AI driven automation and resilient operations.
Colby DeRodeff of Abstract Security, chief executive officer and co-founder, joins Jon Oltsik of theCUBE Research, principal analyst in residence, on The Cybersecurity Bridge podcast to examine the current state and future of security operations and the security operations center, abbreviated SOC. DeRodeff draws on their Security Information and Event Management, abbreviated SIEM, and detection engineering background and covers composable SIEM and Security Operations analytics platform architecture, abbreviated SOAPA, detection analytics, artificial intelligence, abbreviated AI, including AI-assisted triage and investigations, data normalization and routing, retention strategies and the tradeoffs of centralized versus federated analytics across cloud and on-premises environments.DeRodeff states that SIEM remains an essential capability even as its form evolves; they emphasize composable architectures for best-of-breed flexibility and cost-efficient data routing and advocate AI as an enabler not a human replacement. Oltsik underscores the need for a clear data strategy, hybrid operating models, context-enriched detection and independence from platform lock-in to modernize SOCs effectively.Listen to the full episode for actionable guidance on modernizing security operations, composable SIEM design, AI-enabled SOC workflows and data pipelining across cloud and on-premises environments.
Join us for “The Cybersecurity Bridge” podcast, hosted by Jon Oltsik, principal analyst in residence with theCUBE. In each episode, In each episode of the podcast, Oltsik and his guests look at three aspects of a specific cybersecurity area: 1) The present state, 2) The future state, and 3) The drivers (and impediments) users face through the transition from the present to future state (i.e., the cybersecurity bridge).
Topics range across the spectrum of cybersecurity, including areas like network security, human risk management, detection engineering, skill set and career development, process automation, and the impact of AI on the business and security. Please reach out to Jon directly with podcast feedback, suggested topics, and recommended speakers (jono@siliconangle.com).