In this session, we'll delve into two crucial dimensions of cybersecurity analytics - source data and the utilization of that data. Firstly, we'll explore source data, shedding light on what kind of information is gathered, pinpointing the data collection locations, and describing the components of source data, such as network traffic visibility, vulnerability reports, event logs, inventory discovery, application behavior, and more. Secondly, we'll examine the consumption of source data, identify the teams and roles that should be leveraging this data, outline the potential use cases, and expected outcomes, and discuss the tools that can transform vast amounts of data
into actionable insights.
✨ Subscribe for more tech videos! @CiscoUtube ✨
Learn more about Cisco U. cs.co/9001OQthl
Create a Cisco U. Free Account: cs.co/9001OQtCx
FOLLOW US ON SOCIAL
X (Formerly Twitter): / learningatcisco
Facebook: / learningatcisco
Instagram: / learningatcisco
LinkedIn: / cisco_training_and_cer...
Негізгі бет Zero Trust Architecture: Analytics
No video
Пікірлер