The Right Roles for SIEM and EDR

Advanced SOC Operations / CSOC , Endpoint Security , Next-Generation Technologies & Secure Development

Cybereason’s Sam Curry on Honing Threat Hunting Capabilities

ISMG’s Tom Field (left) and Sam Curry, CSO of Cybereason

When it comes to threat hunting, what are the complementary uses of SIEM and EDR technologies? What are the unique use cases for each, and how can they coexist? Sam Curry of Cybereason shares tips in advance of a virtual roundtable discussion.

See Also: Live Webinar | More Data, More Problems: Applying the Right Automation to Propel Security Operations

In a video interview with Information Security Media Group, Curry discusses:

  • The right and wrong roles of SIEM and EDR;
  • Unique use cases for each technology;
  • His vision of an autonomous SOC.

Curry brings over 25 years of experience in security with a focus on deep technology and solving practitioner problems to his role as Cybereason’s CSO. He was previously CTO and CSO at Arbor Networks, senior vice president of engineering and CISO at Microstrategy and held a number of significant senior roles at RSA.

For more details about this and other virtual roundtables, please visit the Virtual Roundtable registrations page.

Share this post

Share on facebook
Share on linkedin
Share on print
Share on email

Subscribe to our Monthly Cyber Security Digest

Get monthly content to keep you up to date on the latest news and tips