For decades, security teams have relied on data connectors that vendors provide and often purchase a vendor based on their connector coverage. This is an outdated log management method where security teams must ingest the same data sets into different point products to derive insights. With the rise in popularity of security data lakes, security teams are taking advantage of data infrastructure and tools that do not require analysts to build their own data pipelines or rely on API connectors. Furthermore, analysts can ingest data into their security data lake once and leverage it for various use cases – reducing cost and data movement. Security leaders are also excited to own their data pipelines without extensive data engineering work.
Join us in this power-packed discussion to learn:
- Popular patterns of log ingestion and transformation for your security data lake
- How to ingest stateless and stateful data into Snowflake with ease
- How to leverage the power of the Snowflake Data Cloud for vulnerability and risk reporting
Speakers
Kam Amir
Director of Technical Alliances, Cribl
Kaushik Devireddy
Product Manager, Dassana
Kelly Huang,
Product Marketing Manager, Snowflake
Ravi Kumar
Partner Sales Engineer, Snowflake
Agenda
A New World: Activating Cybersecurity In The Data Cloud
Discuss ingestion methods for your Snowflake security data lake and how to leverage an ecosystem of applications to deliver insights.
Enhance Your Visibility with Risk Data
Learn how to use Dassana as a security ETL
Aggregate Events Data with Cribl Stream
Learn how to use Cribl Stream to send data into Snowflake’s Streaming API
Demo: Snowflake + Dassana + Cribl
Learn how to aggregate logs and risk data in Snowflake for reporting.