In today’s dynamic world of distributed computing and cloud-scale systems, traditional security data platforms and tools such as SIEM typically fall short of actually delivering the intelligence needed to better adapt to the rapidly changing threat landscape. This is primarily due to a lack of core data lifecycle management, analytics, and integration capabilities. In addition to closing these functional gaps, security organizations could benefit by making AI/ML-driven advanced analytics a core component of their security intelligence capabilities. While there is admittedly a lot of hype around the concept of a “security data lake” in the industry, most approaches to date have not really delivered the type of usable intelligence needed to be as nimble as we must be in today’s cybersecurity world.
To address these issues, Adobe is taking a holistic approach to data and analytics that aims to enable efficiencies and scale for its Security organization. We have embarked on a journey to build an integrated and holistic security data and analytics platform as a foundational building block in its security organization. Join Krishna Patil, Principal Architect, Security, from Adobe as he discusses with ISACA's Collin Beder the approach we have taken to provide insights you can use to help tackle the problem of not just gathering the right data but making it more actionable to your security teams. Tune into this ISACA Podcast now!
To learn more about Adobe, please visit: www.adobe.com
To listen to more ISACA Podcasts, please visit: www.isaca.org/podcasts
Rethinking Identity Governance
2023: The Year of Risk
Improving Cyber Resilience in an Age of Continuous Attacks
Advancing Digital Trust Through Audit and Assurance
ISACA Live_Critical Infrastructure Security
ISACA Live | Risk Scenarios
ISACA Live | How to Mature Your Privacy Compliance Program
Career Coach Advice: How to Launch Your IT Audit Career
ISACA Live | Advancing Digital Trust Through Data Privacy
ISACA Live | The Dark Future of Privacy
Information Privacy Contradiction: Interest-Based Posture of Compliance and Violation
ISACA Live | Advancing Digital Trust Through IT
Should Cybersecurity Be Subject to a SOX-Type Regulation?
Beware the Traps of Data Governance and Data Management Practice
Convergence: Where Next?
Do Data Go To Waste
Protecting Your Enterprise and Deterring Fraud in a New Risk Era
The Circle of Failure: Why the Cyber Security Industry Doesn’t Work
Meeting Attackers Where They Are
Taking Security Strategy to the Next Level: The Cyber Kill Chain vs. MITRE ATT&CK
Create your
podcast in
minutes
It is Free
Insight Story: Tech Trends Unpacked
Zero-Shot
Fast Forward by Tomorrow Unlocked: Tech past, tech future
The Unbelivable Truth - Series 1 - 26 including specials and pilot
Lex Fridman Podcast