Blueprint: Build the Best in Cyber Defense cover image

Strategy 7: Select and Collect the Right Data

Blueprint: Build the Best in Cyber Defense

00:00

The Importance of Identity in Network Monitoring

The SOC must have a variety of different monitoring and data collection capabilities that together help corroborate different things being seen. So you're not just saying, well, I'm going to slap EDR or an open source of Kovalon on every host and I'm done. You never could do that. And you definitely can't do it today. Rather, you've got to be able to say I've got identity logs and host logs and cloud logs and app service logs and and and and together the SOC sees that complete picture.

Transcript
Play full episode

The AI-powered Podcast Player

Save insights by tapping your headphones, chat with episodes, discover the best highlights - and more!
App store bannerPlay store banner
Get the app