Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Intelligent workflows: SAP's approach to SOAR in the AI era

Join SAP’s CISO and Tines’ Co-founder for a conversation on how SAP is modernizing its SOAR workflows and building an AI SOC capability with Tines. As SAP scales its global enterprise cloud services, the security team is taking a new approach to workflow automation: combining deterministic playbooks with intelligent, AI-assisted workflows that improve speed, accuracy, and visibility across security operations.

Unlocking AI's full value: CIO and CISO perspectives

AI investment is accelerating across industries. Many organizations have either fully or extensively embedded AI in their business processes today. Yet, 40%* of IT teams still express a lack of trust in AI-generated outcomes. They remain in reactive mode, held back by disconnected systems, manual work, and rigid tools. What’s missing?

Bridging the identity gap: Orchestrating IAM across teams and systems

In most organizations, identity is everyone’s responsibility, and yet no one’s accountable. Security defines the policy, but IT carries out the execution. IAM workflows span cloud and on-prem systems, multiple departments, and often rely on manual processes. The result? Delays, inconsistent access, audit gaps, and mounting operational risk.

Beyond manual forensics: Booking.com's approach to orchestrating incident response

Browser history can play a critical role in incident response, from helping analysts reconstruct user activity and validating alerts, to uncovering malicious behavior. But retrieving raw artifacts from endpoints is often slow, manual, and inconsistent. In this technical session, Ahmad Aziz, Security Engineer II at Booking.com, will share his winning entry from the 2024 “You Did WHAT?! With Tines” (YDWWT) competition: a fully automated workflow that pulls raw browser history artifacts from devices using CrowdStrike and prepares them for offline forensic analysis.

Three ways to mature your legacy GRC program in a highly regulated environment

What does a modern, well-functioning GRC program look like today? Join us for an on-demand webinar with Dragos and Regscale, where we’ll explore exactly that. Learn the biggest sources of friction to maturing a GRC program, how to evaluate what’s worth automating or standardizing in your GRC workflows, and what the path forward looks like for proactively managing risk and compliance in high-regulation environments.

Optimizing the SOC: Leveraging AI and automation for modern threats

The Security Operations Center (SOC) is the nerve center of an organization's defenses, but its efficiency and effectiveness are often limited by the growing volume and complexity of threats. By leveraging AI-driven threat detection and automated incident response, security leaders can optimize their SOC to respond faster and smarter. For CISOs, this means not only protecting the organization from current threats but also future-proofing defenses against an increasingly sophisticated threat landscape.