How to Regain Control of Your Cybersecurity Tech Stack

Logo
Presented by

Craig Harber, COO

About this talk

It all starts so simple; you acquire a tool to solve a security concern. Then another problem arises, so you need to purchase another security tool. Next thing you know you have 60+ different products in your security stack and more problems than ever. To make matters worse, most cybersecurity stacks are not well integrated or properly configured. When security stacks lack integration and automation, it means a good deal of human intervention is required to address and triage alerts, which results in slower response times. In this presentation, we’ll show you how to regain control of an unruly security stack. We’ll do a thorough demonstration of how to use the MITRE ATT&CK Cyber Threat Framework to help you develop your approach to rationalizing your cybersecurity stack.
Related topics:

More from this channel

Upcoming talks (0)
On-demand talks (56)
Subscribers (9290)
Security tactics for elite security professionals. We help security teams actively defend their organizations with best practices and expert knowledge on threat hunting, threat intelligence and detection & response.