From Detection to Response: The Power of SentinelOne + Hyperautomation
We’ll explore how Singularity Data Lake can transform security incident detection and response through a detailed analysis of attack strategies. We’ll identify attackers’ intrusion, privilege escalation, and persistence techniques.
In this webinar, you’ll learn how hyperautomation can improve response efficiency by integrating third-party solutions and designing automated workflows.
Agenda:
10:00 AM NexTReT Presentation
10:05 AM – What is Singularity Data Lake and an overview
10:10 AM – Intrusion Techniques: Identification and Analysis
10:15 AM – Privilege Escalation: Technique Recognition
10:20 AM – Persistence: Technique Identification
10:25 AM – Hyperautomation: Integration with Third-Party Solutions
10:30 AM – Hyperautomation Workflow Design
10:50 AM – Questions and Answers
11:00 AM – End of the session