Cloud SIEM - What Happened and What's Next?

Cloud SIEM - What Happened and What's Next?

BruCON Security Conference via YouTube Direct link

Attack Timelines

11 of 26

11 of 26

Attack Timelines

Class Central Classrooms beta

YouTube videos curated by Class Central.

Classroom Contents

Cloud SIEM - What Happened and What's Next?

Automatically move to the next video in the Classroom when playback concludes

  1. 1 Cloud SIEM: What happened and what's next? Gunter Ollmann
  2. 2 A 20 Year Journey
  3. 3 Cloud Native SIEM
  4. 4 Overwhelmed with Data
  5. 5 Cutting-edge Today
  6. 6 Raw Events to High Fidelity Incidents
  7. 7 Changes in Hunter Thinking
  8. 8 Reactive Investigation vs Preemptive Hunting
  9. 9 Prioritizing Haystacks
  10. 10 Cloud-native Threat Hunting
  11. 11 Attack Timelines
  12. 12 User & Event Behavioral Analytics (UEBA)
  13. 13 Al-powered Threat Intelligence
  14. 14 (Auto) Threat Hunting
  15. 15 (Auto) Mitigation
  16. 16 Cloud Effects on Hunting
  17. 17 Cloud Effects on Response
  18. 18 Ditching Human Constraints
  19. 19 The Threat Hunter Role
  20. 20 Technology Constraints
  21. 21 Constraining Al in Security
  22. 22 Replicate the Human Expert?
  23. 23 Change the medium...
  24. 24 Evolving Machine Intelligence
  25. 25 Conclusion
  26. 26 Belgian Style Hacking

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.