How To Get Ahead Of The Security Data Curve -- And Stay There

Security teams are overwhelmed with incident data, alerts, and log files. Each endpoint and each application generates its own set of data. How are security teams supposed to make sense of all the data they have? In this webinar, experts discuss ways to effectively collect, aggregate, and analyze security data so that you can identify threats and attacks you may have missed. Learn how to automate some of the analysis and how to improve analysis so that you can stop threats effectively before they cause more damage.

On Demand
1h 00min

Attend this webinar and you'll:

  • Discover new ways to triage the torrents of data that regularly overwhelm SOC analysts.
  • Find more granular ways to get to the data points most critical to security management.
  • Better understand where automation is a fit for filtering vast sums of data.
  • Improve data analysis techniques and procedures to accelerate threat identification.

Featured Speakers

  • Brad Causey
    Brad Causey
    Vice President of Offensive Security

    Brad Causey is an active member of the security and forensics community worldwide. Brad tends to focus his time on Web Application security as it applies to global and enterprise arenas. He is a member of the OWASP Global Projects Committee and the President of the International Information Systems Forensics Association chapter in Alabama. Brad is an avid author and writer with hundreds of publications and several books. Brad also holds dozens of industry recognized certificates such as CISSP, MCSE, C|EH, CIFI, and CGSP.

  • Josh Zelonis
    Josh Zelonis
    Cortex Field CTO
    Palo Alto Networks

    Josh Zelonis is a Field CTO and Evangelist for Palo Alto Networks where he works closely with organizations to help them adapt their architecture, policies, and processes to stay ahead of evolving threats and limit the potential impact of incidents. As a former Forrester analyst and cybersecurity tech founder, Josh has spoken at major conferences around the world and published on subjects ranging from security analytics, cyber intelligence, vulnerability management, SOC operations, and incident response. Above all, he prides himself on a mission to secure the data of the people we’re entrusted to protect.

  • Terry Sweeney
    Terry Sweeney
    Dark Reading

    Terry Sweeney is a Los Angeles-based writer and editor who's covered business technology for three decades. He's written about cyber security for more than 15 years and was one of the founding editors of Dark Reading. Sweeney has covered enterprise networking extensively, as well as its supporting technologies like storage, wireless, cloud-based apps and the emerging Internet of Things. He's been a contributing editor to The Washington Post, Crain’s New York Business, Red Herring, Information Week, Network World,, and Stadium Tech Report.

Sponsored By