-
In your experience, past and present, what would make clients trust vendor detection content?
-
Regarding “canned”, default or “out-of-the-box” detections, how to make them more production quality and not merely educational samples to learn from?
-
What is more important, seeing the detection or being able to change it, or both?
-
If this is about seeing the detection code/content, what about ML and algorithms?
-
What about the SOC analysts who don't read the code?
-
What about “tuning” - is tuning detections a bad word now in 2023?
-
Everybody is obsessed about “false positives,” what about the false negatives? How are we supposed to eliminate them if we don’t see detection logic?
-
Video (Linkedin, YouTube)
-
Github rules for Chronicle
-
DetectionEngineering.net by Zack Allen
-
“On Trust and Transparency in Detection” blog
-
“Detection as Code? No, Detection as COOKING!” blog
-
EP64 Security Operations Center: The People Side and How to Do it Right
-
EP108 How to Hunt the Cloud: Lessons and Experiences from Years of Threat Hunting
-
EP75 How We Scale Detection and Response at Google: Automation, Metrics, Toil
-
Why is Threat Detection Hard?
-
Detection Engineering is Painful — and It Shouldn’t Be (Part 1, 2, 3, 4, 5)