SOT

SOT

SOAR
Security Orchestration, Automation and Response

Automation of response to information security incidents using dynamic playbooks and information security tools, building an attack chain and with an object-oriented approach

NG SOAR
Next Generation SOAR

Automation of response to information security incidents with built-in basic correlation (SIEM), vulnerability Scanner (VS), collection of raw events directly from information security tools, dynamic playbooks, building an attack chain and an object-oriented approach. AM and VM are included

AM
Asset Management

Description of the IT landscape, detection of new objects on the network, categorization of assets, inventory, life cycle management of equipment and software on automated workstations and servers of organizations

VS
Vulnerability Scanner

Scanning information assets with enrichment from any external services (additional scanners, The Data Security Threats Database and other analytical databases) to analyze the security of the infrastructure.

VM
Vulnerability Management

Building a process for detecting and eliminating technical vulnerabilities, collecting information from existing security scanners, update management platforms, expert external services and other solutions

FinCERT
Financial Computer Emergency Response Team

Bilateral interaction with the Central Bank, namely the transfer of information about incidents and receipt of prompt notifications/bulletins from the regulator

GovCERT
Government Computer Emergency Response Team

Bilateral interaction with the state coordination center for computer incidents, namely the transfer of information about incidents and receipt of prompt notifications/bulletins from the regulator

Mail us to sales@securityvision.ru or get demo presentation

Welcome to the SOAR: Cybersecurity Without Borders Session at PHDays

Welcome to the SOAR: Cybersecurity Without Borders Session at PHDays
15.05.2025

Date: May 22

Time: 14.00-15.00

Location: Positive Hack Days Fest, Luzhniki, Hall 11 "Wright Brothers "/Wright Brothers Hall 11

Moderator: Arkady Glushenkov, IT editor of RBC TV Channel


On May 22, information security directors will gather for the Security Vision session "SOAR: Cybersecurity without Borders." They will discuss topical issues of choosing, using and evaluating SOAR (Security Orchestration, Automation and Response) systems designed to orchestrate, automate and respond to cyber incidents:

   •   Which companies need SOAR?

   •   How to choose the right SOAR system

   •   SOAR performance metrics

   •   SOAR success stories in companies of different sizes. Addressing specific cybersecurity challenges with SOAR

   •   SOAR-as-a-Service: advantages and disadvantages for different types of business


Speakers:

   ·   Roman Shapiro, Head of the Information Security Directorate, Russian Post

   ·   Alexander Ardakov, Head of Practical Security, Norilsk Nickel

   ·   Dmitry Baldin, Deputy Director of the Department of Information Technologies and Digital Development, RusHydro

   ·   Artyom Gribkov, Director of the Center for Cyber ​ ​ Resilience Angara Security

   ·   Roman Ovchinnikov, Director of Implementation, Security Vision

   ·   Vyacheslav Kasimov, Director of the Information Security Department of the ICD

   ·   Andrey Kashirin, Information Security Director, Cherkizovo Group


Also during the session, a report will be made by Roman Shapiro, Head of the Information Security Directorate of Russian Post, "From disparate solutions to centralized protection: SOAR in the infrastructure of Russian Post."


We are waiting for you at the session!

Recommended

Security Vision – partner of the conference "Rosatom Information Security"
Security Vision – partner of the conference "Rosatom Information Security"
Roman Dushkov presented Security Vision at the Russian-Serbian Business Mission in Belgrade
Roman Dushkov presented Security Vision at the Russian-Serbian Business Mission in Belgrade
Evgeny Bisovko and Anastasia Novozhilova will make a presentation Configuration Management. How to build and optimize a process at PHDays
Evgeny Bisovko and Anastasia Novozhilova will make a presentation Configuration Management. How to build and optimize a process at PHDays
Security ecosystem Vision is certified by FSTEC of Russia at the 4th level of trust
Security ecosystem Vision is certified by FSTEC of Russia at the 4th level of trust
Security Vision became a partner of the forum "Cyber Resistant Arctic 2025"
Security Vision became a partner of the forum "Cyber Resistant Arctic 2025"
Cyber resilience is a new security priority interview with Viktor Goncharov in Cyber Media
Cyber resilience is a new security priority interview with Viktor Goncharov in Cyber Media
For the second year in a row, Security Vision entered the Top 3 of the CSR rating for infrastructure protection, demonstrating outstripping growth and leadership in the SOAR product
For the second year in a row, Security Vision entered the Top 3 of the CSR rating for infrastructure protection, demonstrating outstripping growth and leadership in the SOAR product
Ekaterina Gainullina will speak at PHDays with a report "Safe development without barriers: how to implement SSDLC that works"
Ekaterina Gainullina will speak at PHDays with a report "Safe development without barriers: how to implement SSDLC that works"
Security Vision has increased the prioritization of vulnerabilities by the FSTEC of Russia
Security Vision has increased the prioritization of vulnerabilities by the FSTEC of Russia
Security Vision products are included in the Solutions Catalog of the Moscow Technology Bank
Security Vision products are included in the Solutions Catalog of the Moscow Technology Bank
Welcome to the SOAR: Cybersecurity Without Borders Session at PHDays
Welcome to the SOAR: Cybersecurity Without Borders Session at PHDays
Mikhail Karpenko will make a presentation "Dynamic playbooks in SOC: Orchestration of response to multi-stage attacks using the NIST framework" at PHDays
Mikhail Karpenko will make a presentation "Dynamic playbooks in SOC: Orchestration of response to multi-stage attacks using the NIST framework" at PHDays

Recommended

Security Vision – partner of the conference "Rosatom Information Security"
Security Vision – partner of the conference "Rosatom Information Security"
Roman Dushkov presented Security Vision at the Russian-Serbian Business Mission in Belgrade
Roman Dushkov presented Security Vision at the Russian-Serbian Business Mission in Belgrade
Evgeny Bisovko and Anastasia Novozhilova will make a presentation Configuration Management. How to build and optimize a process at PHDays
Evgeny Bisovko and Anastasia Novozhilova will make a presentation Configuration Management. How to build and optimize a process at PHDays
Security ecosystem Vision is certified by FSTEC of Russia at the 4th level of trust
Security ecosystem Vision is certified by FSTEC of Russia at the 4th level of trust
Security Vision became a partner of the forum "Cyber Resistant Arctic 2025"
Security Vision became a partner of the forum "Cyber Resistant Arctic 2025"
Cyber resilience is a new security priority interview with Viktor Goncharov in Cyber Media
Cyber resilience is a new security priority interview with Viktor Goncharov in Cyber Media
For the second year in a row, Security Vision entered the Top 3 of the CSR rating for infrastructure protection, demonstrating outstripping growth and leadership in the SOAR product
For the second year in a row, Security Vision entered the Top 3 of the CSR rating for infrastructure protection, demonstrating outstripping growth and leadership in the SOAR product
Ekaterina Gainullina will speak at PHDays with a report "Safe development without barriers: how to implement SSDLC that works"
Ekaterina Gainullina will speak at PHDays with a report "Safe development without barriers: how to implement SSDLC that works"
Security Vision has increased the prioritization of vulnerabilities by the FSTEC of Russia
Security Vision has increased the prioritization of vulnerabilities by the FSTEC of Russia
Security Vision products are included in the Solutions Catalog of the Moscow Technology Bank
Security Vision products are included in the Solutions Catalog of the Moscow Technology Bank
Welcome to the SOAR: Cybersecurity Without Borders Session at PHDays
Welcome to the SOAR: Cybersecurity Without Borders Session at PHDays
Mikhail Karpenko will make a presentation "Dynamic playbooks in SOC: Orchestration of response to multi-stage attacks using the NIST framework" at PHDays
Mikhail Karpenko will make a presentation "Dynamic playbooks in SOC: Orchestration of response to multi-stage attacks using the NIST framework" at PHDays

Other news

Security Vision was included in the top 3 of the Russian low-code platform market
Security Vision was included in the top 3 of the Russian low-code platform market
Rinat Mavlyutov, Agroeco: The choice of vulnerability scanner from Security Vision is due to its comprehensive and innovative approach
Rinat Mavlyutov, Agroeco: The choice of vulnerability scanner from Security Vision is due to its comprehensive and innovative approach
Security Vision introduced new platform features: updated interface, improved workflows and ways to provide data
Security Vision introduced new platform features: updated interface, improved workflows and ways to provide data
We invite you to the webinar "CM. Automation of assessment of compliance with standards and best practices"
We invite you to the webinar "CM. Automation of assessment of compliance with standards and best practices"
For the second year in a row, Security Vision entered the Top 3 of the CSR rating for infrastructure protection, demonstrating outstripping growth and leadership in the SOAR product
For the second year in a row, Security Vision entered the Top 3 of the CSR rating for infrastructure protection, demonstrating outstripping growth and leadership in the SOAR product
Sergey Zelenin will tell how to protect children in the digital world
Sergey Zelenin will tell how to protect children in the digital world
The present and future of cyber threats comments by Ruslan Rakhmetov for Forbes
The present and future of cyber threats comments by Ruslan Rakhmetov for Forbes
We invite you to the webinar "CII. Automate and Systematize Critical Information Infrastructure Protection Activities"
We invite you to the webinar "CII. Automate and Systematize Critical Information Infrastructure Protection Activities"
Leonid Ilyin told CISOCLUB what cookies are and how they can be dangerous
Leonid Ilyin told CISOCLUB what cookies are and how they can be dangerous

Other news

Security Vision was included in the top 3 of the Russian low-code platform market
Security Vision was included in the top 3 of the Russian low-code platform market
Rinat Mavlyutov, Agroeco: The choice of vulnerability scanner from Security Vision is due to its comprehensive and innovative approach
Rinat Mavlyutov, Agroeco: The choice of vulnerability scanner from Security Vision is due to its comprehensive and innovative approach
Security Vision introduced new platform features: updated interface, improved workflows and ways to provide data
Security Vision introduced new platform features: updated interface, improved workflows and ways to provide data
We invite you to the webinar "CM. Automation of assessment of compliance with standards and best practices"
We invite you to the webinar "CM. Automation of assessment of compliance with standards and best practices"
For the second year in a row, Security Vision entered the Top 3 of the CSR rating for infrastructure protection, demonstrating outstripping growth and leadership in the SOAR product
For the second year in a row, Security Vision entered the Top 3 of the CSR rating for infrastructure protection, demonstrating outstripping growth and leadership in the SOAR product
Sergey Zelenin will tell how to protect children in the digital world
Sergey Zelenin will tell how to protect children in the digital world
The present and future of cyber threats comments by Ruslan Rakhmetov for Forbes
The present and future of cyber threats comments by Ruslan Rakhmetov for Forbes
We invite you to the webinar "CII. Automate and Systematize Critical Information Infrastructure Protection Activities"
We invite you to the webinar "CII. Automate and Systematize Critical Information Infrastructure Protection Activities"
Leonid Ilyin told CISOCLUB what cookies are and how they can be dangerous
Leonid Ilyin told CISOCLUB what cookies are and how they can be dangerous