View this workshop on-demand to learn how to increase resiliency by enabling security workflows, threat modeling, compliance requirements, and real-time threat hunting
Central log management is an important tool for an organization’s threat management capabilities and compliance requirements. Modern security operations center activities require access to log data from a variety of sources as well as tips on how to use these logs in driving context and correlation. Learn how to use logs for threat hunting, driving compliance, and reporting.
Enabling efficient security workflows
SIEM rule engineering - requirements (threat modeling and risk)
Case management, SOC, and threat hunting
Driving compliance and reporting
Optional enrichment - asset data, and VM scans
We hope you find the content informative. Please reach out to us at email@example.com with any follow up questions.
Please fill out the form to access the workshop
Head of Product Marketing
Humio Head of IT Security at CrowdStrike
Security Team Lead at Vijilan Security
Additional sessions in this series
Integrating security throughout your infrastructure