Threathunting Okta with Elastic
Details
- Introductions ( Gavin, Oliver, Will) (2 min each)
- Background on Attacks on Cloud Native Solutions (Will) (3 min)
- What is Threat Hunting? (Gavin) (3 min)
- What is Elastic? (Oliver) (3 min)
- What is Dorothy? (Gavin) ( 2 to 3 min)
- What is Okta? (Gavin) ( 2 to 3 min)
- How can Dorothy be used to generate events that an attacker would use? (Gavin) (5 min)
- Q&A ( Gavin, Oliver, Will)
Network Security
Web Security
New Technology
Mobile Technology
Technology
