In this webinar, you’ll learn how Dropbox implemented Detection-as-Code using Panther. The content will cover Dropbox’s detection workflow and the benefits of applying software development best practices to your detection logic. Then, we’ll step through a hypothetical, real-world example of an AWS detection from start to finish - beginning with a vulnerability and finishing with alert resolution.
NEW
The Complete AI SOC Platform is here. Read the announcement →
close
The Complete AI SOC Platform is here. Read the announcement →
close
WEBINAR
How Dropbox uses Detection-as-Code for AWS Threats
How Dropbox uses Detection-as-Code for AWS Threats
TK
Ted Kietzman
JP
Jeff Puchalski
Recommended Resources
RESOURCES
Recommended Resources
Bolt-on AI closes alerts. Panther closes the loop.
See how Panther compounds intelligence across the SOC.


Bolt-on AI closes alerts. Panther closes the loop.
See how Panther compounds intelligence across the SOC.
Bolt-on AI closes alerts. Panther closes the loop.
See how Panther compounds intelligence across the SOC.


Bolt-on AI closes alerts. Panther closes the loop.
See how Panther compounds intelligence across the SOC.


Get product updates, webinars, and news
By submitting this form, you acknowledge and agree that Panther will process your personal information in accordance with the Privacy Policy.
All rights reserved © 2026 Panther, Inc
Get product updates, webinars, and news
By submitting this form, you acknowledge and agree that Panther will process your personal information in accordance with the Privacy Policy.
All rights reserved © 2026 Panther, Inc
Get product updates, webinars, and news
By submitting this form, you acknowledge and agree that Panther will process your personal information in accordance with the Privacy Policy.
All rights reserved © 2026 Panther, Inc









