

Detection at Scale
Panther Labs
The Detection at Scale Podcast is dedicated to helping security practitioners and their teams succeed at managing and responding to threats at a modern, cloud scale.
Every episode is focused on actionable takeaways to help you get ahead of the curve and prepare for the trends and technologies shaping the future.
Every episode is focused on actionable takeaways to help you get ahead of the curve and prepare for the trends and technologies shaping the future.
Episodes
Mentioned books

9 snips
Feb 11, 2025 • 31min
Salesforce's Mor Levi on Transforming Security Operations with AI Agents
Mor Levi, VP of Detection, Analysis, & Response at Salesforce, shares her expertise on integrating AI in security operations. She reveals how Agent Force achieved 90% automation in triage while maintaining effectiveness. Topics include securing AI implementations, the evolving roles of security analysts, and the importance of data quality. Mor discusses the balance between AI efficiency and human creativity, emphasizing the need for strategic thinking in an increasingly automated landscape. Real-world examples provide insights into both the challenges and successes of AI in enterprise security.

Nov 27, 2024 • 30min
Outreach’s Brandon Kovitz on Balancing Human Intuition and AI in Cyber Defense
In this episode of Detection at Scale, Jack speaks to Brandon Kovitz, Senior Manager of Detection & Response at Outreach, shares his insights on the evolving landscape of cybersecurity. He discusses the critical role of generative AI in enhancing detection and response capabilities, emphasizing the importance of understanding data to maximize security tools' effectiveness.
Brandon also highlights the balance between human intuition and AI, noting that while AI can analyze vast amounts of data, it lacks the nuanced understanding of intent that only humans can provide. Tune in to learn how organizations can leverage AI while maintaining essential human oversight in their security strategies!
Topics discussed:
The importance of operationalizing detection and response capabilities to enhance security posture in a cloud-native, SaaS-first environment.
Leveraging generative AI to improve data analysis and streamline detection processes, ultimately enabling faster responses to emerging cyber threats.
The critical balance between AI capabilities and human intuition, emphasizing that human expertise is essential for understanding intent behind actions in cybersecurity.
Understanding the data landscape is vital for maximizing the effectiveness of security tools and ensuring a strong return on investment.
The role of automation in reducing the noise from tier one and tier two security alerts, allowing teams to focus on complex issues.
Insights on building a detection-as-code pipeline to facilitate rapid implementation of security measures in response to emerging vulnerabilities.
The significance of collaboration between security teams and privacy experts to ensure compliance and protect customer data in AI initiatives.
The future of cybersecurity operations, including the potential for AI to automate many routine tasks and enhance overall operational efficiency.
The necessity for ongoing education and adaptation in the cybersecurity field to keep pace with technological advancements and evolving threats.
Resources Mentioned:
Brandon Kovitz on LinkedIn
Outreach website

11 snips
Nov 14, 2024 • 26min
Rootly’s JJ Tang on Transforming Incident Management Culture
JJ Tang, CEO and Co-founder of Rootly and former Instacart innovator, shares his insights on transforming incident management. He discusses why it's crucial to view incident management as a cultural shift rather than just a tooling problem. Tang emphasizes breaking down silos between security and other teams to improve communication. He highlights the role of security practitioners as educators, the importance of data analysis in preventing incidents, and strategies to foster a culture of reliability across organizations.

Sep 24, 2024 • 19min
Grammarly’s Thijn Bukkems on Working Backwards from Response Strategies
Thijn Bukkems, Threat Hunting Lead at Grammarly, shares his expertise in building robust security intelligence programs. He emphasizes working backwards from response strategies to create effective threat detection mechanisms. Collaboration across teams is crucial to avoid silos and uncover valuable insights. Thijn discusses maximizing existing resources, enhancing security efficiency through adaptable tools, and the importance of internal threat modeling. He highlights the need to prioritize tasks and balance analytical research with practical solutions in the ever-evolving landscape of cybersecurity.

Sep 4, 2024 • 25min
CRED’s Saksham Tushar on Data Enrichment for Effective Threat Detection
Saksham Tushar, the Head of Security Operations & Threat Detection Engineering at CRED, dives into the intricacies of compliance in a fast-paced tech environment. He discusses how CRED streamlines complex compliance requirements and leverages automation to enhance threat detection. Saksham highlights the importance of verifying automated outcomes and using Python libraries for swift incident investigations. Additionally, he emphasizes the need for contextual understanding of security incidents and the integration of threat intelligence to create a robust security operations framework.

Aug 20, 2024 • 41min
Netflix’s Dan Cao and Brex’s Josh Liburdi on Balancing Big Platforms and Bespoke Tools
Dan Cao is the Engineering Manager of Security Incident and Response at Netflix, and Josh Liburdi is a Staff Security Engineer at Brex. They dive into the shift toward developer-centric security operations and the challenge of balancing big platforms with bespoke tools. The importance of critical thinking and foundational skills in cybersecurity is emphasized. They share strategies for building resilient security teams through effective mentorship and culture, highlighting the need for adaptability in our ever-evolving tech landscape.

Aug 6, 2024 • 24min
ThoughtSpot’s Alessio Faiella on Building Forward-Looking Security Programs
Alessio Faiella, the Director of Security Engineering & Security Operations at ThoughtSpot, shares his expertise on building forward-looking security initiatives. He emphasizes the importance of understanding product nuances and user behavior in security strategy. Alessio discusses how AI enhances detection and response, offering real-time recommendations during incidents. He highlights the need for detailed playbooks to optimize resource allocation and covers the balance between automation and human oversight to strengthen security operations.

4 snips
Jul 23, 2024 • 25min
Sprinklr’s Roger Allen on Preventing Team Burnout in Cybersecurity
Roger Allen, Senior Director and Global Head of Detection and Response at Sprinklr, delves into the complexities of cybersecurity. He emphasizes the importance of understanding adversaries' tactics to enhance detection capabilities. Roger discusses integrating adversary simulations to strengthen security measures and improve response strategies. He addresses team burnout through balanced workloads and meaningful discussions. With actionable insights on data management and alert prioritization, he provides a roadmap for building resilient security operations.

Jul 9, 2024 • 21min
WP Engine’s Christopher Watkins on Cost-Effective Threat Hunting Strategies
Christopher Watkins from WP Engine shares insights on efficient logging with native tools and API gateways. Strategies for cost-effective threat hunting and optimizing queries. Importance of mental well-being in cybersecurity. Tips on data management across cloud services.

Jun 25, 2024 • 28min
Elastic’s Darren LaCasse on Cutting Alert Volumes in Half By Automating Responses
In this episode of Detection at Scale, Jack Naglieri chats with Darren LaCasse, Director of Threat Intelligence, Incident Response, & Threat Detection at Elastic. Darren offers insights into the innovative project around detection as code, shedding light on the methodologies Elastic employs to enhance security operations.
Darren touches on the challenges of managing massive amounts of data, the importance of prioritization in security tasks, and how automation has revolutionized their response strategies. He also shares practical advice on conducting gap analyses to focus on what truly matters.
Topics discussed:
The importance of prioritizing security tasks to focus on critical business-impacting elements, ensuring a resilient security framework.
Strategies for handling and analyzing large volumes of security data to maintain effective monitoring and response capabilities.
How automation has halved alert volumes, freeing analysts from repetitive tasks and enhancing overall productivity.
Conducting regular gap analyses and attack path discussions to visualize vulnerabilities and direct security efforts effectively.
The role of tagging and context-aware responses in streamlining security operations and making analysts' lives easier.
Prioritizing security efforts based on the criticality of vendors and data, focusing first on restricted and critical vendors.
The importance of conducting at least annual reviews to reassess and improve security controls and monitoring strategies.
Using metrics to measure the effectiveness of security measures and guide continuous improvement efforts.
Resources Mentioned:
Darren LaCasse on LinkedIn
Elastic Security Solution website