Summary
For many organizations, centralizing and storing logs is the first step in the path to security observability – even if they don't realize that they've embarked on a journey. A pivotal tool in this endeavor is advanced log management, capable not only of identifying threats but guiding the entire threat lifecycle – from initial incident response discovery through informed containment and eradication strategies.
Dive deep with us into the realm of modern log management for security to gain insights on how to:
- Leverage log management as the backbone of your incident response strategy
- Increase threat investigation speed with a unified analyst experience
- Close skills gap with AI-powered automation, integrated threat intelligence, and Kestrel open-source threat hunting
Key Speakers
Amber Borgersen, Product Manager, IBM Security QRadar
Amber Borgersen is a Product Manager for IBM Security QRadar. Starting her career closest to the customer, Amber spent 3 years supporting customers as a Cybersecurity Technical Specialist. Now, in her role as PM of QRadar Go-to-Market, she is focused on bringing cutting edge security technology to customers.
Daniella Pontes, Lead Product Marketing Manager, IBM QRadar Log Insights
Daniella Pontes is a seasoned cybersecurity expert with over a decade of experience in the field. As the Lead Product Marketing Manager for IBM QRadar Log Insights, she has honed her expertise in the art of securing digital landscapes. Daniella is passionate about sharing her insights and knowledge with the cybersecurity community.
#IBMTechXchangeWebinars