View this workshop on-demand to get an in-depth technical overview of Tactics, Techniques, and Procedure (TTP), threat intelligence frameworks, SIEM rule engineering, and data forensics.
This session dives further into how to use logs for threat management and forensics. Learn new techniques, tactics, and procedures used by seasoned SecOps and DevOps practitioners.
Tactics, Techniques, and Procedure (TTP)
Threat intelligence frameworks
SIEM rule engineering - making sure we are evolving and not revolving
Data forensics - the new frontier
We hope you find the content informative. Please reach out to us at firstname.lastname@example.org with any follow up questions.
Please fill out the form to access the workshop
Head of Product Marketing
Sales Engineer at SOC Prime
Sr. Security Architect
Security Team Lead at Vijilan Security
Additional sessions in this series
Threat management and forensics using streaming log data