Elevate Your SOC: Automation Trends
& Best Practices

On-Demand Webinar

The potential of automation in cybersecurity is enticing, but many organizations fail to realize the full extent of its benefits when they rely on a one-size-fits-all approach. This webinar will discuss how to reduce risk holistically, how to measure success within the Modern SOC, and how to implement automation that is tailored specifically for your organization’s needs so that it remains sustainable.

Join experts from Recorded Future, Splunk, Ernst & Young, and NOV as we explore these topics, including: 

  • Why it’s important to orchestrate before you automate
  • How to measure success of automation, but also the costs associated with automating processes
  • Best practices and things to avoid when it comes to your automation journey 
Watch Now

Featuring the following speakers:


Jason Steer

CISO at Recorded Future

Jason Steer is CISO at Recorded Future. Jason has global responsibility for ensuring the protection, integrity, confidentiality, and availability of all customer-facing services, internal operational systems, and related information assets. He has previously held positions at a number of successful security companies over the past 15 years, including IronPort, Veracode, and FireEye. Jason’s expert commentary has been featured in BBC, CNN, and Al Jazeera, and he has worked with both the EU and UK Governments on cyber security strategy. Jason holds a Degree in Management Information Systems. 

Haylee Mills

Security Strategist at Splunk

Haylee went to school for 2D animation and worked in that industry for four years before 80 hour weeks and 40 hours of minimal pay crushed her soul and her dreams. During her quarter-life crisis living with her parents, she bicycled across the United States and dabbled in documentary film-making, aquaponics, and urban gardening. She ultimately wandered into information security as a career path thanks to a friend in the field who believed in her and dangled the starting pay for an information security analyst. Beyond the money, she quickly developed a passion for the craft as well as building pipelines for folks to achieve financial stability in this career. She started as a SOC analyst working crappy alerts, made better alerts and an elegant investigation workflow in Splunk with Risk-Based Alerting as a Content Engineer, and finally moved to Splunk to evangelize and advise on RBA as a Security Strategist.

Jim Wolfe

Senior Security Architect at Recorded Future

Jim Wolfe is a Senior Security Architect on the Enterprise Security team at Recorded Future. Prior to Recorded Future he worked for a Professional Services company, where he was the Director of Technology & Security Services. Prior to that he was a Splunk Security Consultant for two years. Jim started his career at US Steel, where he started a Deskside Support intern and eventually made his way to the Cybersecurity Operations team, primarily working on Splunk and network security. He received his B.S. In Information Science from the University of Pittsburgh, and my M.S. in Information Security & Assurance from Robert Morris University. 

John McLeod

CISO at NOV Inc.

John is the CISO at NOV Inc., responsible for cybersecurity in the enterprise and in products. John brings a wealth of expertise to NOV with over 25 years of experience in information security. Prior to NOV, he responded to some of the highly publicized cyber-attacks, including Moonlight Maze, Titan Rain, Night Dragon, TJX, and Operation Aurora. He holds a graduate degree in information security and is a Certified Information Systems Security Professional (CISSP).

Robb Mayeski

Senior Manager Cybersecurity, Ernst & Young

Robb is the Cyber Threat Resilience capability leader for Ernst & Young’s National Technology Consulting practice, based New Jersey. Robb Mayeski is a Senior Manager specializing in Security Operations, and Threat Resilience Architecture. At EY, Robb advises clients on opportunities to improve their cyber security functions to reduce risk and improve resilience through building defense in depth architecture, developing optimized teams and automating processes.