Chapters
Intro
Intro
0:00
Intro
0:00
THE CHALLENGES IN THE CLOUD
THE CHALLENGES IN THE CLOUD
3:38
THE THREATS IN THE CLOUD
THE THREATS IN THE CLOUD
5:31
TRADITIONAL SIEM IS NOT ENOUGH
TRADITIONAL SIEM IS NOT ENOUGH
7:28
AZURE SENTINEL-NO LONGER JUST A "SIEM"
AZURE SENTINEL-NO LONGER JUST A "SIEM"
8:24
AZURE SENTINEL-NATIVE CLOUD SOLUTION
AZURE SENTINEL-NATIVE CLOUD SOLUTION
10:28
AZURE SENTINEL - SIEM AS A CODE
AZURE SENTINEL - SIEM AS A CODE
12:10
THE SOC MANAGER
THE SOC MANAGER
20:19
THE SOC MANAGER
20:19
OPTIMIZING INGESTION COSTS-FILTERING AT THE SOURCE
OPTIMIZING INGESTION COSTS-FILTERING AT THE SOURCE
28:15
OPTIMIZING INGESTION COSTS-SYSLOG DAEMON AND LOGSTASH
OPTIMIZING INGESTION COSTS-SYSLOG DAEMON AND LOGSTASH
30:52
OPTIMIZING INGESTION COSTS - CUSTOM CODE
OPTIMIZING INGESTION COSTS - CUSTOM CODE
32:11
OPTIMIZING RETENTION COSTS
OPTIMIZING RETENTION COSTS
33:22
THE SECURITY ANALYST - THREAT HUNTING
THE SECURITY ANALYST - THREAT HUNTING
42:14
The Security Analyst - Enrichment
The Security Analyst - Enrichment
47:06
Sync to video time
Description
2Likes
307Views
2022Oct 14
- https://go.cyberproof.com/ransomware-...
- https://go.cyberproof.com/sans-2022-s...
- https://go.cyberproof.com/cyber-defen...
- Loredana Arnautu
- Michelle Fleming
- Saggie Haim
- Howard Silverman
- Javier Soriano
Transcript
Follow along using the transcript.
Show transcript
Microsoft Events
135K subscribers
Transcript
NaN / NaN
Show more