Advanced SOC Operations / CSOC , Endpoint Security , Next-Generation Technologies & Secure Development

The Right Roles for SIEM and EDR

Cybereason's Sam Curry on Honing Threat Hunting Capabilities
ISMG's Tom Field (left) and Sam Curry, CSO of Cybereason

When it comes to threat hunting, what are the complementary uses of SIEM and EDR technologies? What are the unique use cases for each, and how can they coexist? Sam Curry of Cybereason shares tips in advance of a virtual roundtable discussion.

See Also: User Entity & Behavior Analytics 101: Strategies to Detect Unusual Security Behaviors

In a video interview with Information Security Media Group, Curry discusses:

  • The right and wrong roles of SIEM and EDR;
  • Unique use cases for each technology;
  • His vision of an autonomous SOC.

Curry brings over 25 years of experience in security with a focus on deep technology and solving practitioner problems to his role as Cybereason's CSO. He was previously CTO and CSO at Arbor Networks, senior vice president of engineering and CISO at Microstrategy and held a number of significant senior roles at RSA.

For more details about this and other virtual roundtables, please visit the Virtual Roundtable registrations page.

About the Author

Tom Field

Tom Field

Senior Vice President, Editorial, ISMG

Field is responsible for all of ISMG's 28 global media properties and its team of journalists. He also helped to develop and lead ISMG's award-winning summit series that has brought together security practitioners and industry influencers from around the world, as well as ISMG's series of exclusive executive roundtables.

Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing, you agree to our use of cookies.