Detection at Scale

Panther Labs
undefined
11 snips
Nov 14, 2024 • 26min

Rootly’s JJ Tang on Transforming Incident Management Culture

JJ Tang, CEO and Co-founder of Rootly and former Instacart innovator, shares his insights on transforming incident management. He discusses why it's crucial to view incident management as a cultural shift rather than just a tooling problem. Tang emphasizes breaking down silos between security and other teams to improve communication. He highlights the role of security practitioners as educators, the importance of data analysis in preventing incidents, and strategies to foster a culture of reliability across organizations.
undefined
Sep 24, 2024 • 19min

Grammarly’s Thijn Bukkems on Working Backwards from Response Strategies

Thijn Bukkems, Threat Hunting Lead at Grammarly, shares his expertise in building robust security intelligence programs. He emphasizes working backwards from response strategies to create effective threat detection mechanisms. Collaboration across teams is crucial to avoid silos and uncover valuable insights. Thijn discusses maximizing existing resources, enhancing security efficiency through adaptable tools, and the importance of internal threat modeling. He highlights the need to prioritize tasks and balance analytical research with practical solutions in the ever-evolving landscape of cybersecurity.
undefined
Sep 4, 2024 • 25min

CRED’s Saksham Tushar on Data Enrichment for Effective Threat Detection

Saksham Tushar, the Head of Security Operations & Threat Detection Engineering at CRED, dives into the intricacies of compliance in a fast-paced tech environment. He discusses how CRED streamlines complex compliance requirements and leverages automation to enhance threat detection. Saksham highlights the importance of verifying automated outcomes and using Python libraries for swift incident investigations. Additionally, he emphasizes the need for contextual understanding of security incidents and the integration of threat intelligence to create a robust security operations framework.
undefined
Aug 20, 2024 • 41min

Netflix’s Dan Cao and Brex’s Josh Liburdi on Balancing Big Platforms and Bespoke Tools

Dan Cao is the Engineering Manager of Security Incident and Response at Netflix, and Josh Liburdi is a Staff Security Engineer at Brex. They dive into the shift toward developer-centric security operations and the challenge of balancing big platforms with bespoke tools. The importance of critical thinking and foundational skills in cybersecurity is emphasized. They share strategies for building resilient security teams through effective mentorship and culture, highlighting the need for adaptability in our ever-evolving tech landscape.
undefined
Aug 6, 2024 • 24min

ThoughtSpot’s Alessio Faiella on Building Forward-Looking Security Programs

Alessio Faiella, the Director of Security Engineering & Security Operations at ThoughtSpot, shares his expertise on building forward-looking security initiatives. He emphasizes the importance of understanding product nuances and user behavior in security strategy. Alessio discusses how AI enhances detection and response, offering real-time recommendations during incidents. He highlights the need for detailed playbooks to optimize resource allocation and covers the balance between automation and human oversight to strengthen security operations.
undefined
4 snips
Jul 23, 2024 • 25min

Sprinklr’s Roger Allen on Preventing Team Burnout in Cybersecurity

Roger Allen, Senior Director and Global Head of Detection and Response at Sprinklr, delves into the complexities of cybersecurity. He emphasizes the importance of understanding adversaries' tactics to enhance detection capabilities. Roger discusses integrating adversary simulations to strengthen security measures and improve response strategies. He addresses team burnout through balanced workloads and meaningful discussions. With actionable insights on data management and alert prioritization, he provides a roadmap for building resilient security operations.
undefined
Jul 9, 2024 • 21min

WP Engine’s Christopher Watkins on Cost-Effective Threat Hunting Strategies

Christopher Watkins from WP Engine shares insights on efficient logging with native tools and API gateways. Strategies for cost-effective threat hunting and optimizing queries. Importance of mental well-being in cybersecurity. Tips on data management across cloud services.
undefined
Jun 25, 2024 • 28min

Elastic’s Darren LaCasse on Cutting Alert Volumes in Half By Automating Responses

In this episode of Detection at Scale, Jack Naglieri chats with Darren LaCasse, Director of Threat Intelligence, Incident Response, & Threat Detection at Elastic. Darren offers insights into the innovative project around detection as code, shedding light on the methodologies Elastic employs to enhance security operations.  Darren touches on the challenges of managing massive amounts of data, the importance of prioritization in security tasks, and how automation has revolutionized their response strategies. He also shares practical advice on conducting gap analyses to focus on what truly matters.    Topics discussed: The importance of prioritizing security tasks to focus on critical business-impacting elements, ensuring a resilient security framework. Strategies for handling and analyzing large volumes of security data to maintain effective monitoring and response capabilities. How automation has halved alert volumes, freeing analysts from repetitive tasks and enhancing overall productivity. Conducting regular gap analyses and attack path discussions to visualize vulnerabilities and direct security efforts effectively. The role of tagging and context-aware responses in streamlining security operations and making analysts' lives easier. Prioritizing security efforts based on the criticality of vendors and data, focusing first on restricted and critical vendors. The importance of conducting at least annual reviews to reassess and improve security controls and monitoring strategies. Using metrics to measure the effectiveness of security measures and guide continuous improvement efforts.   Resources Mentioned:  Darren LaCasse on LinkedIn Elastic Security Solution website
undefined
5 snips
Jun 11, 2024 • 44min

Check Point’s Daniel Wiley on Balancing Technology and Human Analytics in Cybersecurity

Daniel Wiley, Head of Threat Management at Check Point, discusses the highs and lows of cybersecurity startups, effective incident response strategies for SMBs, and the integration of machine analytics and human expertise in managing large amounts of cybersecurity data.
undefined
May 28, 2024 • 19min

Inductive Automation’s Jason Waits on Building Scalable Security Programs Through Automation

Jason Waits, CISO at Inductive Automation, discusses the role of SCADA systems in security, challenges in building scalable security programs with automation, and the impact of IT-OT convergence. He emphasizes the importance of automation in security operations, ML, and AI for efficient data analysis to enhance detection capabilities.

The AI-powered Podcast Player

Save insights by tapping your headphones, chat with episodes, discover the best highlights - and more!
App store bannerPlay store banner
Get the app