Biography
Before joining Sentinel One in 2020, Jan Tietze served in senior technical and management roles ranging from engineering to CIO and CTO roles for global IT and consultancy organizations. With a strong background in enterprise IT and an early career in senior field engineering roles in Microsoft and other security and consulting organizations, Jan understands real world risk, challenges and solutions and has been a trusted advisor to his clients for many years.
Jan Tietze ist seit 2020 bei Sentinel One tC$tig. Vorher war er als technischer Experte und Manager von Entwicklung bis zu CIO/CTO bei internationalen IT- und Beratungsunternehmen tC$tig. Durch seine Erfahrung in der Enterprise IT und frC<here Aufgaben in Field Engineering-Rollen bei Microsoft und anderen Sicherheits- und Beratungsunternehmen kennt er Risiken und Herausforderungen, vor denen Kundenorganisationen stehen, ebenso wie praktische LC6sungsansC$tze. Er ist seit vielen Jahren ein geschC$tzter GesprC$chspartner und Berater fC<r seine Kunden.
Speech Topic & Synopses
Security teams are working hard on the front lines identifying, analyzing and mitigating threats. Yet despite all their efforts, visibility into malicious activity remains challenging as the mean time to identify a security breach is still 197 days, with the mean time to containment being another 69 days after initial detection (source: Ponemon Institute).
The reality is that with the current reactive approaches to cyber defense, there simply aren’t enough skilled professionals to analyze the volume of incidents that most organizations face. With limited resources, an ever-growing skills gap and an escalating volume of security alerts, organisations are left vulnerable to what is perceived to be unavoidable risk.
This environment is demanding more of already resource-constrained CISOs. So how can they further minimise risk from cyber threats without further increasing the workload?
Join this presentation to hear more about how automation can help
- Drastically reduce the amount of uninvestigated and unresolved alerts
- Automate time-consuming investigations and remediate well-known threats
- Act as a force multiplier for resource-constrained security teams
- Reduce your organization’s security risk exposure, including the time to containment and remediation