
Demonstrating Cribl Search with Cory Wallace
This demonstration of Cribl Search explores how to search data at the edge, without needing to move it to a centralized repository, and how to search data at rest in object stores, without needing to index it or store data in a proprietary format.
Introducing Cribl Search with Nick Heudecker
Cribl Search turns the traditional search process on its head, allowing users to search data in place. No longer must data be collected and moved to storage before being examined, now administrators can search data at the edge, moving through an observability pipeline, stored in a data lake, or even stored in their existing solutions […]
Exploring Cribl Stream and Cribl Edge
This demonstration explores Cribl Stream and Cribl Edge. Cribl Stream is a vendor-agnostic observability pipeline that gives you the flexibility to collect, reduce, enrich, normalize, and route data from any source to any destination within your existing data infrastructure. You’ll finally achieve full control of your data, empowering you to choose how to treat your […]
Solving Security’s Data Problem with Cribl
Security has a data problem. Despite managing dozens of tools and working closely with IT and external service providers, teams are still struggling to build a sustainable architecture and . We’ll show you how effective use of data pipelines reduces volume, amplifies signal to noise ratio, saves countless hours and dollars, and may even save […]
Introduction to Cribl with Nick Heudecker
Cribl’s mission is to unlock the value of all observability data – the logs, events, metrics, and traces comprising your monitoring and security environment. This session provides an introduction to Cribl’s approach to restore choice and control over observability data with Cribl Stream, its leading observability pipeline. We’ll also explore Cribl Edge and the newly […]
Swimlane Good (SecOps) Defense is Having a Good Offense
Every security organization, team, and individual is trying to get ahead of everything on their plate but seldom do we have the time to do everything we need to get to everything. Many teams have immense backlogs of processes, activities, and programs that, given enough manpower, would help reduce the risk to their organization. In […]
Doing Security Incident Response in Your Sleep with Swimlane
As we all know, security operations is an around-the-clock job, but building automation response systems is a way to drastically reduce the impact of a potential breach, as well as human error and much of the fatigue that teams are plagued with daily. In this section, we will show you how to measure your readiness […]
Building a SecOps Automation Foundation with Swimlane
The SecOps Automation Maturity Model is a framework for helping organizations better understand where they are on the security automation maturity spectrum. In this section, we will discuss and demonstrate what both a foundational and enriched SecOps automation state should look like and how to better measure and prepare your team for an automation journey.
HashiCorp Zero Trust Security Overview
HashiCorp provides infrastructure automation software for multi-cloud environments, enabling enterprises to unlock a common cloud operating model to provision, secure, connect, and run any application on any infrastructure. In this presentation, Megan LaFlamme, Director, Product Marketing, will introduce HashiCorp’s approach to zero trust security with identity-based access and authorization.
Micron Secure Device Configuration Demo using Triathlon Platform
One of the Achilles’ heels of the cybersecurity industry is that the establishing of trust has always been expensive, complex, and untimely. Semiconductors have a fragmentation problem, creating challenges for embedded security experts. Meanwhile, cloud platforms want to speak a single API language that is hardware agnostic. But there has been no strong ecosystem force […]
Micron Device Identities on ICAM – IT Meets OT
Identity, Credential and Access Management is a foundational component of building trust. Building trust starts with determining identity, and, from there, continuing to build trust with authentication and authorization. In the supply chain it also starts with identification, authentication, and authorization. Considering how products come to market, the ability to securely communicate is based on […]