Completed
Belgian Style Hacking
Class Central Classrooms beta
YouTube videos curated by Class Central.
Classroom Contents
Cloud SIEM - What Happened and What's Next?
Automatically move to the next video in the Classroom when playback concludes
- 1 Cloud SIEM: What happened and what's next? Gunter Ollmann
- 2 A 20 Year Journey
- 3 Cloud Native SIEM
- 4 Overwhelmed with Data
- 5 Cutting-edge Today
- 6 Raw Events to High Fidelity Incidents
- 7 Changes in Hunter Thinking
- 8 Reactive Investigation vs Preemptive Hunting
- 9 Prioritizing Haystacks
- 10 Cloud-native Threat Hunting
- 11 Attack Timelines
- 12 User & Event Behavioral Analytics (UEBA)
- 13 Al-powered Threat Intelligence
- 14 (Auto) Threat Hunting
- 15 (Auto) Mitigation
- 16 Cloud Effects on Hunting
- 17 Cloud Effects on Response
- 18 Ditching Human Constraints
- 19 The Threat Hunter Role
- 20 Technology Constraints
- 21 Constraining Al in Security
- 22 Replicate the Human Expert?
- 23 Change the medium...
- 24 Evolving Machine Intelligence
- 25 Conclusion
- 26 Belgian Style Hacking