Cherlynn Cha (ExpressVPN)
Detection-as-Code: Build threat detections the way you build software
View More Papers
A Comparative Analysis of Difficulty Between Log and Graph-Based...
Matt Jansen, Rakesh Bobba, Dave Nevin (Oregon State University)
Read MoreAccelerating Mean Time to Response for Externally Discovered Exposures
Johnathan Wilkes, John Anny (Palo Alto Networks)
Read MoreSOC Service Areas: Identification, Prioritization, and Implementation
Christopher Rodman, Breanna Kraus, Justin Novak (SEI/CERT)
Read More