7 Steps to Automating Threat Detection and Analysis

Logo
Presented by

Josh Rickard, Security Research Engineer, Swimlane and Nick Tausek, Security Research Engineer, Swimlane

About this talk

There are numerous cybersecurity tools available to help organizations detect threats. But, this volume creates a number of challenges, including siloed and disparate systems. While these tools are intended to improve the organization’s security posture, many of them require sophisticated staff with complex training to leverage them effectively. Sometimes, even with training, systems generate so many alerts the highly-skilled staff is unable to analyze and respond to real threats in a timely manner. This is not sustainable for even the largest security operations center (SOC). A holistic, automated approach to threat detection and analysis is necessary. In this webinar, Swimlane’s Josh Rickard will provide seven steps to automate threat detection and analysis that can be used in any-sized SOC. This process enables analysts to stop focusing on detection and focus instead on a proactive SOC model, improving the security posture of the organization and dramatically reducing threat risk. You will learn how to: - Monitor everything within your security stack; - Build a system that can automatically detect every form of attack; - Improve your ability to detect attacks and avoid false positives; - Detect security threats in real time; - And more!
Related topics:

More from this channel

Upcoming talks (1)
On-demand talks (38)
Subscribers (6977)
Swimlane is the leader in AI-enabled, low-code security automation. Swimlane unifies security operations in-and-beyond the SOC into a single system of record to reduce process and data fatigue while quantifying business value and security effectiveness. The cloud-scale Turbine platform combines human and machine data into actionable intelligence for security leaders. For more information, visit swimlane.com.