Integrating security throughout your infrastructure

Multi-session educational course

View this workshop on-demand to learn how to increase resiliency by enabling security workflows, threat modeling, compliance requirements, and real-time threat hunting

Central log management is an important tool for an organization’s threat management capabilities and compliance requirements. Modern security operations center activities require access to log data from a variety of sources as well as tips on how to use these logs in driving context and correlation. Learn how to use logs for threat hunting, driving compliance, and reporting.

Topics covered:

  • Enabling efficient security workflows 

  • SIEM rule engineering - requirements (threat modeling and risk)

  • Case management, SOC, and threat hunting

  • Driving compliance and reporting  

  • Optional enrichment - asset data, and VM scans 

We hope you find the content informative. Please reach out to us at instructor@humio.com with any follow up questions.

Please fill out the form to access the workshop


Huzaifa Dalal

Head of Product Marketing

Simon Simonsen

Humio Head of IT Security at CrowdStrike

Vincent Cosomano

Security Team Lead at Vijilan Security