Posted on
in Presentations
Detecting complex attacks has changed from reliance on tooling like SIEM and been replaced with analyst-derived code. Whether asking the data questions to determine deviation from normal, distilling data for manual analysis or automating SOC functions, python, scripting, unique data structures and search tools are the new normal. This lab will demonstrate and teach analysts creative use of coding tools.
Mobile & IoT Security Hackers & Threats
incident response network security security analytics security intelligence security operations threat intelligence threat management big data analytics
Topic
Mobile & IoT Security
Hackers & Threats
Subtopic
incident response
network security
security analytics
security intelligence
security operations
threat intelligence
threat management
big data analytics
Share With Your Community