Thomas Owen of Grafana on Why Enabled Autonomy is the Future of Modern Security Teams
Thomas shares how to build a team from the ground up, the attributes of a modern security team, how to gauge value of security, and his advice for practitioners around basic hygiene.
Mike Saxton of Booz Allen on Where Teams Start in Their Detection Journey and How Detection as Code is Bridging the Cybersecurity Skills Gap
In this episode Mike discusses everything from getting started on your detection journey, to broader cloud security adoption, the use of open source in government, and more!
How to Implement Effective Security Monitoring for AWS
Get real-world examples of AWS security threats along with practical steps to ensure you can proactively defend against them.
Compass CISO JJ Agha on Relentless Iterations and What He Expects from a Modern SIEM
JJ Agha is the CISO at Compass, the largest real estate brokerage in the US, and previously spent over four years as VP of InfoSec at WeWork, along with time as a security engineer at Vimeo and Priceline.
How Randori Reduced their SIEM-Related TCO by 70%
How Randori Reduced their SIEM Related TCO by 70%
Guild Education Eliminates the Cost of Legacy SIEM with Panther’s Detection-as-Code
Guild Education Eliminates the Cost of Legacy SIEM with Panther's Detection-as-Code
Automating Detection and Response with Panther and Tines
How to use Panther and Tines to generate alerts on suspicious activity, get answers from end-users, enrich data, and leverage automation to save time to focus on the issues that matter most: improving the security of your organization.
State of AWS Log Management
We sought out security professionals who use AWS to better understand what they're seeing, what they’re concerned about, and what they want to improve.
Discord’s Kathy Wang on Building and Managing Security Teams
Kathy Wang is the CISO at Discord, an internationally-recognized malware expert who has researched, developed, evaluated, and operationalized various solutions for detecting and preventing client-side attacks used by advanced persistent threats (APT)