Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Unlocking AI's full value: CIO and CISO perspectives

AI investment is accelerating across industries. Many organizations have either fully or extensively embedded AI in their business processes today. Yet, 40%* of IT teams still express a lack of trust in AI-generated outcomes. They remain in reactive mode, held back by disconnected systems, manual work, and rigid tools. What’s missing?

Bridging the identity gap: Orchestrating IAM across teams and systems

In most organizations, identity is everyone’s responsibility, and yet no one’s accountable. Security defines the policy, but IT carries out the execution. IAM workflows span cloud and on-prem systems, multiple departments, and often rely on manual processes. The result? Delays, inconsistent access, audit gaps, and mounting operational risk.

Beyond manual forensics: Booking.com's approach to orchestrating incident response

Browser history can play a critical role in incident response, from helping analysts reconstruct user activity and validating alerts, to uncovering malicious behavior. But retrieving raw artifacts from endpoints is often slow, manual, and inconsistent. In this technical session, Ahmad Aziz, Security Engineer II at Booking.com, will share his winning entry from the 2024 “You Did WHAT?! With Tines” (YDWWT) competition: a fully automated workflow that pulls raw browser history artifacts from devices using CrowdStrike and prepares them for offline forensic analysis.

Three ways to mature your legacy GRC program in a highly regulated environment

What does a modern, well-functioning GRC program look like today? Join us for an on-demand webinar with Dragos and Regscale, where we’ll explore exactly that. Learn the biggest sources of friction to maturing a GRC program, how to evaluate what’s worth automating or standardizing in your GRC workflows, and what the path forward looks like for proactively managing risk and compliance in high-regulation environments.

Optimizing the SOC: Leveraging AI and automation for modern threats

The Security Operations Center (SOC) is the nerve center of an organization's defenses, but its efficiency and effectiveness are often limited by the growing volume and complexity of threats. By leveraging AI-driven threat detection and automated incident response, security leaders can optimize their SOC to respond faster and smarter. For CISOs, this means not only protecting the organization from current threats but also future-proofing defenses against an increasingly sophisticated threat landscape.

Creating an MCP Server in Tines

MCP servers in Tines allow you to create custom AI tools and connectors using the new MCP server action template. Integrating Tines and MCP streamlines incident response and workflow automation, enhancing efficiency and security operations by enabling seamless communication and data integration between systems. New to Tines? Sign up for our always-free Community Edition and start building right away.