Overview
Explore the complex landscape of data analysis in cybersecurity through this 51-minute conference talk by Jordan, a Program Manager at Microsoft. Delve into the challenges faced by cybersecurity analysts and data scientists in monitoring vast amounts of data to detect suspicious activity. Learn about the importance of reducing false positives, identifying suspicious signals, and compiling threat intelligence to protect organizations. Discover the tools and solutions available for addressing cyber threats, including cloud security posture management, security information event management, and security orchestration, automation, and response. Gain insights from real-world examples, such as the SolarWinds case study, and understand the consequences of over-collection in data monitoring. Enhance your understanding of cybersecurity roles, challenges, and best practices in this informative session suitable for professionals and enthusiasts in the field of data analysis and cybersecurity.
Syllabus
– Introduction
– Security roles
– Cyber challenges
– Collection is not detection
– Consequences of over-collection
– Cyber in the news
– SolarWinds case study
– Cloud security posture management
– Security information event management
– Security Orchestration, automation, and response
– QnA
Taught by
Data Science Dojo