For decades, security teams have relied on data connectors that vendors provide and often purchase a vendor based on their connector coverage. This is an outdated log management method where security teams must ingest the same data sets into different point products to derive insights. With the rise in popularity of security data lakes, security teams are taking advantage of data infrastructure and tools that do not require analysts to build their own data pipelines or rely on API connectors. Furthermore, analysts can ingest data into their security data lake once and leverage it for various use cases – reducing cost and data movement. Security leaders are also excited to own their data pipelines without extensive data engineering work.
Join us in this power-packed discussion to learn:
- Popular patterns of log ingestion and transformation for your security data lake
- How to ingest stateless and stateful data into Snowflake with ease
- How to leverage the power of the Snowflake Data Cloud for vulnerability and risk reporting
Speakers

KAM AMIR
Director of Technical Alliances
Cribl

KAUSHIK DEVIREDDY
Product Manager
Dassana

KELLY HUANG
Product Marketing Manager
Snowflake

RAVI KUMAR
Partner Sales Engineer
Snowflake
Agenda
A New World: Activating Cybersecurity In The Data Cloud
Enhance Your Visibility with Risk Data

Aggregate Events Data with Cribl Stream
