SIEMs remain the workhorse for many enterprise SOCs. However, security teams have challenges with them, specifically steeply rising costs and a decade plus old architecture that combines security analytics, logging, and data storage all in one monolithic closed stack.
While SIEM functionality is needed, there is a growing trend of security teams beginning to adopt modern, more cost-effective security data lakes with security analytics on top that are primed for advanced data science use cases.
However, it’s not always clear how organizations can take advantage of these new security data lakes, what the first steps are in the transition, and what assurances there are that you will be able to transition at your own pace with minimal disruptions to your existing security workflows .
DISCUSSION POINTS
What are the true benefits of adopting a security data lake? How is the model different?
What are the challenges associated with adopting this new SOC architecture? How do I overcome those with our existing team and skill set?
What’s the first step to start adopting a security data lake alongside my SIEM to save on costs?
How can I ensure my threat detection and response strategy has no downtime?
Tom Field
SVP, Editorial
ISMG
Karthik Kannan
Founder/CEO
Anvilogic
Join ISMG’s Tom Field for a moderated discussion that will feature insight from Karthik Kannan, CEO at event sponsor Anvilogic, and will also draw upon the experiences of the attendees. Participants will explore strategies for data lake migration, reskilling teams, and managing migration risk.
This session will be:
270 West 43rd Street, New York, New York, USA, 10036
Anvilogic is a Palo Alto-based AI cybersecurity startup founded by security veterans and data scientists from Fortune 500 companies. Our mission is to democratize threat detection and hunting for today’s SOC teams to easily be done across hybrid, multi-clouds and security data lakes without needing to centralize data or rip and replace tools. Further, with our investments in AI-powered automation of detection-as-code to create, test, tune and deploy detections, SOC users can implement high-efficacy detection and hunting techniques without writing a single line of code nor manually wrangling data.
By taking part in this discussion you agree that:
Upcoming ISMG Events
Upcoming ISMG Events