Panther (@runpanther) 's Twitter Profile
Panther

@runpanther

The security monitoring platform for the cloud.

ID: 1041732737621680129

linkhttps://panther.com/ calendar_today17-09-2018 16:56:53

1,1K Tweet

4,4K Followers

177 Following

Panther (@runpanther) 's Twitter Profile Photo

What is a decoupled SIEM? Dr. Anton Chuvakin, Senior Security Staff at the Office of the CISO at Google Cloud, discusses this in the #DetectionAtScale pod 👉 bit.ly/3YvJsVi

Panther (@runpanther) 's Twitter Profile Photo

How can security leaders prevent burnout? Emanueal Mulatu, Senior Engineering Manager - D&R at Block discusses this in the #DetectionAtScale pod 👉 bit.ly/4f70UEV

Panther (@runpanther) 's Twitter Profile Photo

How do you perform detections on SaaS platforms? Drew Gatchell, Senior Director, Threat Detection at AppOmni, discusses this in the #DetectionAtScale pod 👉 bit.ly/3Yc7GlJ

Panther (@runpanther) 's Twitter Profile Photo

How is a company as large as Meta gauging risk? Justin Anderson, Security Engineering Manager, D&R at Meta, discusses this in the #DetectionAtScale pod 👉 bit.ly/4h7WQWO

Panther (@runpanther) 's Twitter Profile Photo

Human #intuition vs. #AI in #cybersecurity: Brandon Kovitz emphasizes the need for both. While AI analyzes data, only humans can understand intent, making their collaboration essential for effective security! Tune into #DetectionAtScale for more. bit.ly/4eLGD77

Panther (@runpanther) 's Twitter Profile Photo

What are top health metrics for security programs? Matthew Valites, Director of Detection Engineering at SAP, discusses this in the #DetectionAtScale pod 👉 bit.ly/3Uebi5T

Panther (@runpanther) 's Twitter Profile Photo

Can a security data pipeline tool help write better detections? Josh Liburdi, Staff Security Engineer at Brex, discusses this in the #DetectionAtScale pod 👉 bit.ly/3Uhc7uv

Panther (@runpanther) 's Twitter Profile Photo

How useful is behavior analysis in threat detection? Jeff Bollinger, Director of IR and DE at LinkedIn, discusses this in the #DetectionAtScale pod 👉 bit.ly/3BKyEcW

Panther (@runpanther) 's Twitter Profile Photo

What role does automated reasoning play in AWS security? Corey Quinn, Chief Cloud Economist at The Duckbill Group, discusses this in #DetectionAtScale 👉 bit.ly/405ELlZ

Panther (@runpanther) 's Twitter Profile Photo

What are the pros and cons of detection-as-code? Panther CEO Will Lowe and CTO Jack sit down to taste hot sauces and talk hot topics in a special episode of #DetectionAtScale in the style of “Hot Ones” 👉 bit.ly/3BQq5xd

Panther (@runpanther) 's Twitter Profile Photo

What are the pros and cons of a decentralized data management model? Jason Waits, CISO at Inductive Automation, discusses this in the #DetectionAtScale pod 👉 bit.ly/48dEM9E

Panther (@runpanther) 's Twitter Profile Photo

Why might COTS solutions not be enough for a growing business? Daniel Wiley, Head of Threat Management and Chief Security Advisor at Check Point Software, discusses this in the #DetectionAtScale pod 👉 bit.ly/3BLPwA3

Panther (@runpanther) 's Twitter Profile Photo

How can security practitioners utilize third-party management programs to evolve their strategies? Darren LaCasse, Director of Threat Intelligence, Detection, & Response at Elastic, discusses this in the #DetectionAtScale pod 👉 bit.ly/3UcMyuC

Panther (@runpanther) 's Twitter Profile Photo

How can practitioners use BigQuery to make threat detection more cost effective? Christopher Watkins, Senior Staff Cloud Security Engineer at WP Engine, discusses this in the #DetectionAtScale pod 👉 bit.ly/4dSJRFJ

Panther (@runpanther) 's Twitter Profile Photo

How can security practitioners understand business needs and find a balance that leads to practical security solutions? Roger Allen, Senior Director, Global Head of Detection and Response at Sprinklr, discusses this in the #DetectionAtScale pod 👉 bit.ly/48ejzMA

Panther (@runpanther) 's Twitter Profile Photo

Why is adopting forward-looking frameworks like Sigma essential for systemic security? Alessio Faiella, Director of Security Engineering & Security Operations at ThoughtSpot, discusses this in the #DetectionAtScale pod 👉 bit.ly/4079TBG

Panther (@runpanther) 's Twitter Profile Photo

What is a good strategy for building out security operations? Saksham Tushar, Head of Security Operations & Threat Detection Engineering at CRED, discusses this in the #DetectionAtScale pod 👉 bit.ly/3MEXmgI

Panther (@runpanther) 's Twitter Profile Photo

Why is it better to teach technology fundamentals over specific tools? Dan Cao, Engineering Manager of Security Incident and Response at Netflix, discusses this in the #DetectionAtScale pod 👉 bit.ly/4fQjkuK

Panther (@runpanther) 's Twitter Profile Photo

How do you build a threat model for your org? Jason Craig, Director - Threat Detection & Response at Remitly, discusses this in the #DetectionAtScale pod 👉 bit.ly/4dPo81o