Главная
Study mode:
on
1
Introduction
2
Considerations & Requirements
3
Threat Model
4
Build vs. Buy
5
Feature Parity
6
What We Needed
7
Batch Loads
8
Streaming Ingest
9
Scheduled Queries
10
Streaming Alerting
11
Data Access Controls
12
Operational Wins
13
Lessons Learned
14
Overall Effort
15
Resultant Capabilities
16
Cost Savings
17
Observability & Flexibility
Description:
Explore the feasibility and benefits of building a custom cloud-native Security Information and Event Management (SIEM) system in this 29-minute Black Hat conference talk. Learn about Two Sigma's journey to replace their expensive third-party SIEM solution, including considerations for threat modeling, feature parity, and data ingestion methods. Discover the operational wins, lessons learned, and cost savings achieved through this in-house approach. Gain insights into the overall effort required, resulting capabilities, and improved observability and flexibility of a custom SIEM solution.

Can You Roll Your Own SIEM

Black Hat
Add to list
0:00 / 0:00