#detectionatscale search results

Why might COTS solutions not be enough for a growing business? Daniel Wiley, Head of Threat Management and Chief Security Advisor at Check Point Software, discusses this in the #DetectionAtScale pod ๐Ÿ‘‰ bit.ly/3BLPwA3


Can a security data pipeline tool help write better detections? Josh Liburdi, Staff Security Engineer at Brex, discusses this in the #DetectionAtScale pod ๐Ÿ‘‰ bit.ly/3Uhc7uv


What is a decoupled SIEM? Dr. Anton Chuvakin, Senior Security Staff at the Office of the CISO at Google Cloud, discusses this in the #DetectionAtScale pod ๐Ÿ‘‰ bit.ly/3YvJsVi


How are LLMs bringing value to security today? Dhruv Majumdar, Director, Cyber Risk & Advisory at Deloitte, discusses this in the #DetectionAtScale pod ๐Ÿ‘‰ bit.ly/4h7gF0m


How can security leaders prevent burnout? Emanueal Mulatu, Senior Engineering Manager - D&R at Block discusses this in the #DetectionAtScale pod ๐Ÿ‘‰ bit.ly/4f70UEV


How is a company as large as Meta gauging risk? Justin Anderson, Security Engineering Manager, D&R at Meta, discusses this in the #DetectionAtScale pod ๐Ÿ‘‰ bit.ly/4h7WQWO


How useful is behavior analysis in threat detection? Jeff Bollinger, Director of IR and DE at LinkedIn, discusses this in the #DetectionAtScale pod ๐Ÿ‘‰ bit.ly/3BKyEcW


How do you perform detections on SaaS platforms? Drew Gatchell, Senior Director, Threat Detection at AppOmni, discusses this in the #DetectionAtScale pod ๐Ÿ‘‰ bit.ly/3Yc7GlJ


What role does automated reasoning play in AWS security? Corey Quinn, Chief Cloud Economist at The Duckbill Group, discusses this in #DetectionAtScale ๐Ÿ‘‰ bit.ly/405ELlZ


How do you build a threat model for your org? Jason Craig, Director - Threat Detection & Response at Remitly, discusses this in the #DetectionAtScale pod ๐Ÿ‘‰ bit.ly/4dPo81o


What are the pros and cons of a decentralized data management model? Jason Waits, CISO at Inductive Automation, discusses this in the #DetectionAtScale pod ๐Ÿ‘‰ bit.ly/48dEM9E


What are top health metrics for security programs? Matthew Valites, Director of Detection Engineering at SAP, discusses this in the #DetectionAtScale pod ๐Ÿ‘‰ bit.ly/3Uebi5T


Why is it better to teach technology fundamentals over specific tools? Dan Cao, Engineering Manager of Security Incident and Response at Netflix, discusses this in the #DetectionAtScale pod ๐Ÿ‘‰ bit.ly/4fQjkuK


What is a good strategy for building out security operations? Saksham Tushar, Head of Security Operations & Threat Detection Engineering at CRED, discusses this in the #DetectionAtScale pod ๐Ÿ‘‰ bit.ly/3MEXmgI


How can practitioners use BigQuery to make threat detection more cost effective? Christopher Watkins, Senior Staff Cloud Security Engineer at WP Engine, discusses this in the #DetectionAtScale pod ๐Ÿ‘‰ bit.ly/4dSJRFJ


How can security practitioners understand business needs and find a balance that leads to practical security solutions? Roger Allen, Senior Director, Global Head of Detection and Response at Sprinklr, discusses this in the #DetectionAtScale pod ๐Ÿ‘‰ bit.ly/48ejzMA


How can security practitioners utilize third-party management programs to evolve their strategies? Darren LaCasse, Director of Threat Intelligence, Detection, & Response at Elastic, discusses this in the #DetectionAtScale pod ๐Ÿ‘‰ bit.ly/3UcMyuC


Why is adopting forward-looking frameworks like Sigma essential for systemic security? Alessio Faiella, Director of Security Engineering & Security Operations at ThoughtSpot, discusses this in the #DetectionAtScale pod ๐Ÿ‘‰ bit.ly/4079TBG


What are the pros and cons of detection-as-code? Panther CEO Will Lowe and CTO @jack_naglieri sit down to taste hot sauces and talk hot topics in a special episode of #DetectionAtScale in the style of โ€œHot Onesโ€ ๐Ÿ‘‰ bit.ly/3BQq5xd


How do you build a threat model for your org? Jason Craig, Director - Threat Detection & Response at Remitly, discusses this in the #DetectionAtScale pod ๐Ÿ‘‰ bit.ly/4dPo81o


Why is it better to teach technology fundamentals over specific tools? Dan Cao, Engineering Manager of Security Incident and Response at Netflix, discusses this in the #DetectionAtScale pod ๐Ÿ‘‰ bit.ly/4fQjkuK


What is a good strategy for building out security operations? Saksham Tushar, Head of Security Operations & Threat Detection Engineering at CRED, discusses this in the #DetectionAtScale pod ๐Ÿ‘‰ bit.ly/3MEXmgI


Why is adopting forward-looking frameworks like Sigma essential for systemic security? Alessio Faiella, Director of Security Engineering & Security Operations at ThoughtSpot, discusses this in the #DetectionAtScale pod ๐Ÿ‘‰ bit.ly/4079TBG


How can security practitioners understand business needs and find a balance that leads to practical security solutions? Roger Allen, Senior Director, Global Head of Detection and Response at Sprinklr, discusses this in the #DetectionAtScale pod ๐Ÿ‘‰ bit.ly/48ejzMA


How can practitioners use BigQuery to make threat detection more cost effective? Christopher Watkins, Senior Staff Cloud Security Engineer at WP Engine, discusses this in the #DetectionAtScale pod ๐Ÿ‘‰ bit.ly/4dSJRFJ


How can security practitioners utilize third-party management programs to evolve their strategies? Darren LaCasse, Director of Threat Intelligence, Detection, & Response at Elastic, discusses this in the #DetectionAtScale pod ๐Ÿ‘‰ bit.ly/3UcMyuC


Why might COTS solutions not be enough for a growing business? Daniel Wiley, Head of Threat Management and Chief Security Advisor at Check Point Software, discusses this in the #DetectionAtScale pod ๐Ÿ‘‰ bit.ly/3BLPwA3


What are the pros and cons of a decentralized data management model? Jason Waits, CISO at Inductive Automation, discusses this in the #DetectionAtScale pod ๐Ÿ‘‰ bit.ly/48dEM9E


What are the pros and cons of detection-as-code? Panther CEO Will Lowe and CTO @jack_naglieri sit down to taste hot sauces and talk hot topics in a special episode of #DetectionAtScale in the style of โ€œHot Onesโ€ ๐Ÿ‘‰ bit.ly/3BQq5xd


What role does automated reasoning play in AWS security? Corey Quinn, Chief Cloud Economist at The Duckbill Group, discusses this in #DetectionAtScale ๐Ÿ‘‰ bit.ly/405ELlZ


How useful is behavior analysis in threat detection? Jeff Bollinger, Director of IR and DE at LinkedIn, discusses this in the #DetectionAtScale pod ๐Ÿ‘‰ bit.ly/3BKyEcW


Can a security data pipeline tool help write better detections? Josh Liburdi, Staff Security Engineer at Brex, discusses this in the #DetectionAtScale pod ๐Ÿ‘‰ bit.ly/3Uhc7uv


What are top health metrics for security programs? Matthew Valites, Director of Detection Engineering at SAP, discusses this in the #DetectionAtScale pod ๐Ÿ‘‰ bit.ly/3Uebi5T


How is a company as large as Meta gauging risk? Justin Anderson, Security Engineering Manager, D&R at Meta, discusses this in the #DetectionAtScale pod ๐Ÿ‘‰ bit.ly/4h7WQWO


How do you perform detections on SaaS platforms? Drew Gatchell, Senior Director, Threat Detection at AppOmni, discusses this in the #DetectionAtScale pod ๐Ÿ‘‰ bit.ly/3Yc7GlJ


How can security leaders prevent burnout? Emanueal Mulatu, Senior Engineering Manager - D&R at Block discusses this in the #DetectionAtScale pod ๐Ÿ‘‰ bit.ly/4f70UEV


What is a decoupled SIEM? Dr. Anton Chuvakin, Senior Security Staff at the Office of the CISO at Google Cloud, discusses this in the #DetectionAtScale pod ๐Ÿ‘‰ bit.ly/3YvJsVi


How are LLMs bringing value to security today? Dhruv Majumdar, Director, Cyber Risk & Advisory at Deloitte, discusses this in the #DetectionAtScale pod ๐Ÿ‘‰ bit.ly/4h7gF0m


Why manually search when automation can do it faster? ๐Ÿค” Thijn Bukkems, Threat Hunting Lead at Grammarly, explores how automation can streamline data collection and analysis during threat detection in the latest #DetectionatScale episode. Listen for more ๐Ÿ‘‰โ€ฆ


No results for "#detectionatscale"
No results for "#detectionatscale"
Loading...

Something went wrong.


Something went wrong.


United States Trends