Blueprint: Build the Best in Cyber Defense cover image

Strategy 7: Select and Collect the Right Data

Blueprint: Build the Best in Cyber Defense

00:00

How to Monitor Security Data From the Endpoint

The SOC needs to be aware of its privacy promise and regulatory environment, he says. An open source tool can tell you how many times the registry is touched or the disk is touched by a host. "It's kind of fun if you've never done it before," Kucharski adds.

Transcript
Play full episode

The AI-powered Podcast Player

Save insights by tapping your headphones, chat with episodes, discover the best highlights - and more!
App store bannerPlay store banner
Get the app