Threat management and forensics using streaming log data

Multi-session educational course

View this workshop on-demand to get an in-depth technical overview of Tactics, Techniques, and Procedure (TTP), threat intelligence frameworks, SIEM rule engineering, and data forensics.

This session dives further into how to use logs for threat management and forensics. Learn new techniques, tactics, and procedures used by seasoned SecOps and DevOps practitioners.  

Topics covered:

  • Tactics, Techniques, and Procedure (TTP)

  • Threat intelligence frameworks

  • SIEM rule engineering - making sure we are evolving and not revolving

  • Data forensics - the new frontier¬†

We hope you find the content informative. Please reach out to us at instructor@humio.com with any follow up questions.

Please fill out the form to access the workshop


Huzaifa Dalal

Head of Product Marketing

Benjamin McPherson

Sales Engineer at SOC Prime

Simon Simonsen

Sr. Security Architect

Vincent Cosomano

Security Team Lead at Vijilan Security