{"id":13872,"date":"2026-04-17T22:05:51","date_gmt":"2026-04-17T22:05:51","guid":{"rendered":"https:\/\/techtrendfeed.com\/?p=13872"},"modified":"2026-04-17T22:05:51","modified_gmt":"2026-04-17T22:05:51","slug":"contained-in-the-soc-that-secured-rsac-2026-convention","status":"publish","type":"post","link":"https:\/\/techtrendfeed.com\/?p=13872","title":{"rendered":"Contained in the SOC that secured RSAC 2026 Convention"},"content":{"rendered":"<p> <br \/>\n<\/p>\n<div id=\"content-body\">&#13;<\/p>\n<p>Machines whirr and whizz behind the partitioned wall within the RSAC 2026 Convention expo corridor. 5 side-by-side displays flash colourful alerts, charts and statistics. A dozen analysts sit round two tables, their eyes glued to sticker-covered laptops.<\/p>\n<p>It is a glimpse contained in the safety operations heart (<a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/www.techtarget.com\/searchsecurity\/definition\/Security-Operations-Center-SOC\">SOC<\/a>) defending the world&#8217;s largest cybersecurity occasion dwell and in motion, monitoring north-south and east-west visitors throughout the Moscone Middle in San Francisco.<\/p>\n<p>The SOC workforce, made up of Cisco, Splunk and Endace members, is investigating incidents on the community the place practically 44,000 attendees have gathered to <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/www.techtarget.com\/searchsecurity\/conference\/RSA-Conference-news-and-analysis\">study and chat about cybersecurity<\/a> and, greater than doubtless, connect with the occasion&#8217;s free Wi-Fi.<\/p>\n<p>&#8220;We&#8217;re recording all the things that goes throughout the community. We&#8217;ve about 240 TB of storage right here, so we&#8217;ll document each packet from the beginning of the present, proper to the top,&#8221; mentioned Cary Wright, vp of merchandise at Endace. &#8220;These analysts can dig in and examine any occasion or incident and have a look at precisely what occurred earlier than, throughout and after it.&#8221;<\/p>\n<p>The analysts are on the hunt for zero days, insecurities, superior threats and some other suspicious exercise that may not set off the safety stack.<\/p>\n<figure class=\"main-article-image full-col\" data-img-fullsize=\"https:\/\/www.techtarget.com\/rms\/onlineimages\/soc_in_a_box-image1-f.jpg\">\n <img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.techtarget.com\/rms\/onlineimages\/soc_in_a_box-image1-f_mobile.jpg\" class=\"lazy\" srcset=\"https:\/\/www.techtarget.com\/rms\/onlineimages\/soc_in_a_box-image1-f_mobile.jpg 960w,https:\/\/www.techtarget.com\/rms\/onlineimages\/soc_in_a_box-image1-f.jpg 1280w\" alt=\"Photo of the RSAC 2026 Conference SOC-in-a-box setup\" data-credit=\"Sharon Shea\" height=\"420\" width=\"560\"\/><figcaption>\n  <i class=\"icon pictures\" data-icon=\"z\"\/>Analysts used a set of instruments and dashboards to research alerts and defend the RSAC community.<br \/>\n <\/figcaption><\/figure>\n<section class=\"section main-article-chapter\" data-menu-title=\"The technology\">\n<h2 class=\"section-title\"><i class=\"icon\" data-icon=\"1\"\/>The expertise<\/h2>\n<p>The preconfigured SOC in a field, developed for RSAC, was designed to be rolled right into a venue, linked to the community operations heart, and up and working in fewer than 4 hours.<\/p>\n<p>Two Cisco Unified Computing Programs with embedded AI and GPUs present native compute for occasion providers and virtualization wants. A pair of Cisco Safe Firewalls with Firewall Menace Protection run in detection mode on the community edge, and Endace home equipment carry out always-on &#8212; not triggered &#8212; full packet seize and generate metadata, together with Zeek logs.<\/p>\n<p>Telemetry is fed into the safety stack by Splunk Enterprise Safety, and Splunk Assault Analyzer conducts detonation and evaluation. Pivots allow analysts to quickly transfer throughout instruments and workflows.<\/p>\n<p>&#8220;If a firewall detected a menace, for instance, the analyst may pivot to see what community packets had been associated to the menace, if there was lateral motion, if any information was downloaded or exfiltrated, or if any malware was popping out of the community,&#8221; Wright mentioned.<\/p>\n<p>Extra instruments embrace Cisco XDR (<a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/www.techtarget.com\/searchsecurity\/definition\/extended-detection-and-response-XDR\">prolonged detection and response<\/a>); Cisco Safe Community Analytics; Cisco Safety Cloud; Splunk Cloud Platform; Cisco Duo; Cisco ThousandEyes; Cisco Safe Malware Analytics; Splunk Assault Analyzer; Cisco Safe Entry and Splunk SOAR (safety orchestration, automation and response); and <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/www.techtarget.com\/searchsecurity\/tip\/Top-open-source-and-commercial-threat-intelligence-feeds\">menace intelligence<\/a> from Cisco Talos, alphaMountain, Pulsedive and StealthMole.<\/p>\n<\/section>\n<section class=\"section main-article-chapter\" data-menu-title=\"The dashboards\">\n<h2 class=\"section-title\"><i class=\"icon\" data-icon=\"1\"\/>The dashboards<\/h2>\n<figure class=\"main-article-image half-col\" data-img-fullsize=\"https:\/\/www.techtarget.com\/rms\/onlineimages\/soc_in_a_box-image2-h.jpg\">\n  <img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.techtarget.com\/rms\/onlineimages\/soc_in_a_box-image2-h_half_column_mobile.jpg\" class=\"lazy\" srcset=\"https:\/\/www.techtarget.com\/rms\/onlineimages\/soc_in_a_box-image2-h_half_column_mobile.jpg 960w,https:\/\/www.techtarget.com\/rms\/onlineimages\/soc_in_a_box-image2-h.jpg 1280w\" alt=\"Photo of the RSAC 2026 Conference SOC-in-a-box alerts screen.\" data-credit=\"Sharon Shea\" height=\"159\" width=\"280\"\/><figcaption>\n   <i class=\"icon pictures\" data-icon=\"z\"\/>A dashboard displaying safety detections and incidents on the RSAC 2026 community.<br \/>\n  <\/figcaption><\/figure>\n<p>One display shows a illustration of visitors over the previous three days &#8212; a spider chart exhibits who was speaking to whom, with the thickness of the strains indicating visitors quantity.<\/p>\n<p>One other display exhibits visitors being analyzed by Splunk. Twenty % of the visitors is encrypted, and the dashboard exhibits encryption strengths, together with which TLS variations are in use.<\/p>\n<figure class=\"main-article-image half-col\" data-img-fullsize=\"https:\/\/www.techtarget.com\/rms\/onlineimages\/soc_in_a_box-image3-h.jpg\">\n  <img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.techtarget.com\/rms\/onlineimages\/soc_in_a_box-image3-h_half_column_mobile.jpg\" class=\"lazy\" srcset=\"https:\/\/www.techtarget.com\/rms\/onlineimages\/soc_in_a_box-image3-h_half_column_mobile.jpg 960w,https:\/\/www.techtarget.com\/rms\/onlineimages\/soc_in_a_box-image3-h.jpg 1280w\" alt=\"Photo of the RSAC 2026 SOC analysts and alert screens.\" data-credit=\"Sharon Shea\" height=\"188\" width=\"280\"\/><figcaption>\n   <i class=\"icon pictures\" data-icon=\"z\"\/>The left display has a spider chart of community connections.<br \/>\n  <\/figcaption><\/figure>\n<p>A display flashes password counts and password occasions, revealing that 11 hosts on the community are broadcasting their passwords within the clear. There are a complete of 217 occasions, which means every host confirmed their password about 20 instances.<\/p>\n<p>Throughout earlier occasions, Wright defined, they&#8217;d examine, discover the related consumer and inform them that their password was insecure. This time-consuming course of was not too long ago automated, with hosts now receiving an electronic mail from RSAC informing them that their passwords had been discovered within the clear.<\/p>\n<p>RSAC attendees demonstrated higher password hygiene than these at Cisco Dwell in Amsterdam &#8212; Jessica Oppenheimer, director of SOC integrations at Splunk, mentioned 400 hosts there had passwords in cleartext.<\/p>\n<figure class=\"main-article-image half-col\" data-img-fullsize=\"https:\/\/www.techtarget.com\/rms\/onlineimages\/soc_in_a_box-image4-h.jpg\">\n  <img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.techtarget.com\/rms\/onlineimages\/soc_in_a_box-image4-h_half_column_mobile.jpg\" class=\"lazy\" srcset=\"https:\/\/www.techtarget.com\/rms\/onlineimages\/soc_in_a_box-image4-h_half_column_mobile.jpg 960w,https:\/\/www.techtarget.com\/rms\/onlineimages\/soc_in_a_box-image4-h.jpg 1280w\" alt=\"Photo of the RSAC SOC screens.\" data-credit=\"Sharon Shea\" height=\"189\" width=\"280\"\/><figcaption>\n   <i class=\"icon pictures\" data-icon=\"z\"\/>Oppenheimer speaking about RSAC&#8217;s SOC setup. On the proper, a display shows which AI apps are in use.<br \/>\n  <\/figcaption><\/figure>\n<p>One other display shows which AI fashions persons are utilizing. &#8220;Are they ones we have licensed? Ones that ought to be licensed? Are they utilizing their very own?&#8221; Oppenheimer mentioned. &#8220;We are able to determine fashions on the community, and if one had been to adversely have an effect on this convention, we&#8217;ve got the power to dam it.&#8221;<\/p>\n<p>AI is an enormous <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/www.techtarget.com\/searchsecurity\/feature\/How-AI-driven-SOC-tech-eased-alert-fatigue-Case-study\">part of the SOC<\/a> itself. For instance, it helps tier-one analysts course of information, perceive threats and map information. &#8220;That is why up to now 24 hours solely two of 35 alerts have been escalated as much as tier-two or three analysts,&#8221; she mentioned.<\/p>\n<\/section>\n<section class=\"section main-article-chapter\" data-menu-title=\"SOC in a box around the globe\">\n<h2 class=\"section-title\"><i class=\"icon\" data-icon=\"1\"\/>SOC in a field across the globe<\/h2>\n<p>The SOC in a field rolled into RSAC 2026 from Cisco Dwell 2026 in Amsterdam, after remotely defending the NFL Tremendous Bowl in Santa Clara in February. It has additionally been used on the Olympics, Black Hat, Cell World Congress and GovWare occasions. In April, it is going to defend the community in the course of the NFL Draft in Pittsburgh.<\/p>\n<p>The SOC in a field repeatedly evolves. Earlier iterations of the challenge took incident responders three days to realize entry, given the varied instruments from Palo Alto, Corelight, Arista Networks and Jamf, Oppenheimer defined. In response, the workforce created a single sign-on portal and <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/www.techtarget.com\/searchsecurity\/tip\/Types-of-access-control\">carried out role-based entry management<\/a> to offer day-one entry to all analysts.<\/p>\n<p>For the 2028 LA Olympics, Oppenheimer mentioned, the workforce is trying so as to add further AI capabilities into the SOC.<\/p>\n<p><em>Sharon Shea is govt editor of TechTarget Safety.<\/em><\/p>\n<\/section>\n<\/div>\n\n","protected":false},"excerpt":{"rendered":"<p>&#13; Machines whirr and whizz behind the partitioned wall within the RSAC 2026 Convention expo corridor. 5 side-by-side displays flash colourful alerts, charts and statistics. A dozen analysts sit round two tables, their eyes glued to sticker-covered laptops. It is a glimpse contained in the safety operations heart (SOC) defending the world&#8217;s largest cybersecurity occasion [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":13874,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[58],"tags":[291,1924,8698,1391],"class_list":["post-13872","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybersecurity","tag-conference","tag-rsac","tag-secured","tag-soc"],"_links":{"self":[{"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/posts\/13872","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=13872"}],"version-history":[{"count":1,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/posts\/13872\/revisions"}],"predecessor-version":[{"id":13873,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/posts\/13872\/revisions\/13873"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/media\/13874"}],"wp:attachment":[{"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=13872"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=13872"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=13872"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}<!-- This website is optimized by Airlift. Learn more: https://airlift.net. Template:. Learn more: https://airlift.net. Template: 69d9690a190636c2e0989534. Config Timestamp: 2026-04-10 21:18:02 UTC, Cached Timestamp: 2026-04-18 01:36:36 UTC -->