Home
Categories
EXPLORE
True Crime
Comedy
Business
Sports
Society & Culture
History
Fiction
About Us
Contact Us
Copyright
© 2024 PodJoint
00:00 / 00:00
Sign in

or

Don't have an account?
Sign up
Forgot password
https://is1-ssl.mzstatic.com/image/thumb/Podcasts221/v4/8e/5d/5b/8e5d5b37-3bba-55b6-baef-c675f4cc975f/mza_14177638430954617510.jpg/600x600bb.jpg
Secure Networks: Endace Packet Forensics Files
Michael Morris
62 episodes
2 months ago
In this episode of the @Endace, Packet Forensic Files, Michael Morris chats with Steve Fink, CTO and CISO of Secure Yeti and architect of the SOCs for Black Hat, RSA Conference, and Cisco Live, for an in-depth look at building effective Security Operations Centers (SOCs). With 26 years of cybersecurity experience, Fink shares strategies for leveraging packet data, integrating AI for automation, fostering vendor collaboration, and ensuring scalability and resilience. This expert-...
Show more...
Technology
Business,
News,
Tech News
RSS
All content for Secure Networks: Endace Packet Forensics Files is the property of Michael Morris and is served directly from their servers with no modification, redirects, or rehosting. The podcast is not affiliated with or endorsed by Podjoint in any way.
In this episode of the @Endace, Packet Forensic Files, Michael Morris chats with Steve Fink, CTO and CISO of Secure Yeti and architect of the SOCs for Black Hat, RSA Conference, and Cisco Live, for an in-depth look at building effective Security Operations Centers (SOCs). With 26 years of cybersecurity experience, Fink shares strategies for leveraging packet data, integrating AI for automation, fostering vendor collaboration, and ensuring scalability and resilience. This expert-...
Show more...
Technology
Business,
News,
Tech News
https://is1-ssl.mzstatic.com/image/thumb/Podcasts221/v4/8e/5d/5b/8e5d5b37-3bba-55b6-baef-c675f4cc975f/mza_14177638430954617510.jpg/600x600bb.jpg
Episode 59: Matt Bromiley - SANS Author and Instructor | Veteran Threat Hunting Expert
Secure Networks: Endace Packet Forensics Files
38 minutes
1 year ago
Episode 59: Matt Bromiley - SANS Author and Instructor | Veteran Threat Hunting Expert
Unlock the Power of Network Packet Data in CybersecurityIn this episode of the Endace Packet Forensics Files, Michael Morris dives into the critical role of network packet data in cybersecurity with Matt Bromiley, a seasoned threat-hunting expert. Matt shares why robust detection systems and proactive threat hunting are essential, and how network data serves as the “glue” that ties together evidence in cybersecurity investigations.The challenges of managing large data volumes, the growing rol...
Secure Networks: Endace Packet Forensics Files
In this episode of the @Endace, Packet Forensic Files, Michael Morris chats with Steve Fink, CTO and CISO of Secure Yeti and architect of the SOCs for Black Hat, RSA Conference, and Cisco Live, for an in-depth look at building effective Security Operations Centers (SOCs). With 26 years of cybersecurity experience, Fink shares strategies for leveraging packet data, integrating AI for automation, fostering vendor collaboration, and ensuring scalability and resilience. This expert-...