A Security Engineer’s Nightmare – Investigating a Security Breach

In this pre-recorded webinar, Cribl’s Director of Technical Marketing, Steve Litras, walks through the painful tasks of executing a successful security breach and offer some strategies for making it a lot easier. Topics include:

  • How to get old logs back into your SIEM tool for analysis (including thawing old log buckets)
  • Determining the optimal length to retain log data in expensive analytics tools
  • Strategies for storing log data in low-cost storage in case you need to analyze it later

So you're rockin' Internet Explorer!

Classic choice. Sadly, our website is designed for all modern supported browsers like Edge, Chrome, Firefox, and Safari

Got one of those handy?