Tech Field Day

The Independent IT Influencer Event

  • Home
    • The Futurum Group
    • FAQ
    • Staff
  • Sponsors
    • Sponsor List
      • 2025 Sponsors
      • 2024 Sponsors
      • 2023 Sponsors
      • 2022 Sponsors
    • Sponsor Tech Field Day
    • Best of Tech Field Day
    • Results and Metrics
    • Preparing Your Presentation
      • Complete Presentation Guide
      • A Classic Tech Field Day Agenda
      • Field Day Room Setup
      • Presenting to Engineers
  • Delegates
    • Delegate List
      • 2025 Delegates
      • 2024 Delegates
      • 2023 Delegates
      • 2022 Delegates
      • 2021 Delegates
      • 2020 Delegates
      • 2019 Delegates
      • 2018 Delegates
    • Become a Field Day Delegate
    • What Delegates Should Know
  • Events
    • All Events
      • Upcoming
      • Past
    • Field Day
    • Field Day Extra
    • Field Day Exclusive
    • Field Day Experience
    • Field Day Live
    • Field Day Showcase
  • Topics
    • Tech Field Day
    • Cloud Field Day
    • Mobility Field Day
    • Networking Field Day
    • Security Field Day
    • Storage Field Day
  • News
    • Coverage
    • Event News
    • Podcast
  • When autocomplete results are available use up and down arrows to review and enter to go to the desired page. Touch device users, explore by touch or with swipe gestures.
You are here: Home / Videos / Threat Hunting and Automatically Responding to Credential Compromises with Swimlane

Threat Hunting and Automatically Responding to Credential Compromises with Swimlane



Security Field Day 6


This video is part of the appearance, “Swimlane Presents at Security Field Day 6“. It was recorded as part of Security Field Day 6 at 13:30-15:00 on October 21, 2021.


Watch on YouTube
Watch on Vimeo

This real-world use case highlights how a Swimlane Fortune 500 financial services customer encountered a sophisticated phish attempt using credentials exposed on the Dark Web. Swimlane’s Bryon Page, director of solutions architecture, and Cody Cornell, co- founder and chief security officer, demonstrate how the SecOps team extended its use of low-code security automation (SOAR) from Swimlane by integrating a credential compromise monitoring service to reduce the likelihood of future compromises.

Personnel: Bryon Page, Cody Cornell


  • Bluesky
  • LinkedIn
  • Mastodon
  • RSS
  • Twitter
  • YouTube

Event Calendar

  • May 13-May 15 — Tech Field Day Experience at Qlik Connect 2025
  • May 28-May 29 — Security Field Day 13
  • Jun 4-Jun 5 — Cloud Field Day 23
  • Jun 10-Jun 11 — Tech Field Day Extra at Cisco Live US 2025
  • Jul 9-Jul 10 — Networking Field Day 38
  • Jul 16-Jul 17 — Edge Field Day 4
  • Jul 23-Jul 24 — AppDev Field Day 3
  • Sep 10-Sep 11 — AI Infrastructure Field Day 3

Latest Links

  • Automating the network design, what does it really mean?
  • Reflections on Qlik Connect 2025
  • Extending Marvis Minis, client-to-cloud
  • New Juniper’s generalized AI model – A glimpse of what the future will look like
  • Rethinking Monitoring: How Catchpoint Shifts Focus to the End User

Return to top of page

Copyright © 2025 · Genesis Framework · WordPress · Log in