#cognito-Detect

Description of tag.

UX Session

This UX research session uses fun interactive exercises to give us an opportunity to connect with our users and brainstorm new ideas.

Discovering your own security posture and knowing what to triage

How often do you wonder: what should I triage? This decision isn't binary. There isn't a right or wrong answer. We can, however, talk about all the factors that need to go into your decision and provide you some structure around the decisions.

Cybersecurity D&D

You can keep the d20s at home, but table-topping is a great way to train and develop processes. Using a real-world attack to guide us, we'll work together as a blue team to put the pieces of the puzzle together.

Not all models are equal or understanding their cumulative precision - Using PAA models, host scoring

Every model in Cognito Detect represents a different behavior. If the behaviors are different, why are you treating the detections the same? Let's look at different detection combinations and how they tell different stories; not only informing your investigation steps helping you create better custom models yourself.

Using the Cognito API for fun and profit or at least getting labor hours back

Engineering and Data Science are hard at work trying to get more hours into your day, but until they break the time-space continuum, we have the API. Let's chat through some examples and build one ourselves. Laptops required.

Conference Day 1

UX Session

This UX research session uses fun interactive exercises to give us an opportunity to connect with our users and brainstorm new ideas.

Not all models are equal or understanding their cumulative precision - Using PAA models, host scoring

Every model in Cognito Detect represents a different behavior. If the behaviors are different, why are you treating the detections the same? Let's look at different detection combinations and how they tell different stories; not only informing your investigation steps helping you create better custom models yourself.

Conference Day 2

Discovering your own security posture and knowing what to triage

How often do you wonder: what should I triage? This decision isn't binary. There isn't a right or wrong answer. We can, however, talk about all the factors that need to go into your decision and provide you some structure around the decisions.

Cybersecurity D&D

You can keep the d20s at home, but table-topping is a great way to train and develop processes. Using a real-world attack to guide us, we'll work together as a blue team to put the pieces of the puzzle together.

Using the Cognito API for fun and profit or at least getting labor hours back

Engineering and Data Science are hard at work trying to get more hours into your day, but until they break the time-space continuum, we have the API. Let's chat through some examples and build one ourselves. Laptops required.