• Start Time:
  • End Time:
  • Day:
    Day 1


Do you know where you should be looking to expose dark data? Join this presentation to learn how you can easily obtain forensic quality data for threat detection, investigation and hunting:

– detect malicious and suspicious behavior (e.g. breaches, exploits, etc.)

– detect anomalous behaviour

– identify early cyber kill chain warning signals of threats, IOCs, attacks, etc.

Associated Speakers:

Matthew Dwyer

Principal Solutions Architect


Associated Talks:

03:30PM - Day 1

View High definition visibility for cybersecurity in the cloud age

View Full Info