1. HOW TO LEVERAGE LOG DATA FOR EFFECTIVE THREAT DETECTION Tom D’Aquino – Sr. Security Engineer 2. AGENDA The Challenge • Getting adequate security visibility for…
1. WHOSE LOGS, WHAT LOGS, WHY LOGS: YOUR QUICKEST PATH TO SECURITY VISIBILITY Tom D’Aquino Senior Security Engineer AlienVault 2. AGENDA The Challenge • Getting adequate…
1. WHOSE LOGS, WHAT LOGS, WHY LOGS: YOUR QUICKEST PATH TO SECURITY VISIBILITYTom D’Aquino – Sr. SIEM Engineer 2. AGENDA The Challenge • Getting adequate security visibility…