<img src="https://certify.alexametrics.com/atrk.gif?account=Zpb+p1uhUo20dG" style="display:none" height="1" width="1" alt="">

Webinar

Think About Your Audience Before Choosing a Webinar Title


Sponsored by:

Datadog_Google Logo Lockup


On Demand
Anytime

If you have ever read the Sherlock Holmes story 'A Study in Scarlet', there is a quote: "If you have all the details of a thousand misdeeds at your finger ends, it is odd if you can't unravel the thousand and first." What this tells us is that by studying known threat activity, we can guide our efforts to develop more accurate threat detection content.

In this Techstrong Learning Experience, we'll delve into several real-world Google Cloud Platform (GCP) attacks and highlight how to use the available telemetry to identify and detect these attacks before they impact your own systems. In this session, we’ll dive into:

  • Tactics used by threat actors such as lateral movement, privilege escalation and data exfiltration.
  • The types of event logging you need to aid the detection process.
  • How to build targeted detections and enhance your systems' overall security posture.

You'll learn:

  • Common tactics used by threat actors such as lateral movement, privilege escalation and data exfiltration and how they are applied.
  • The types of event logging you should be doing to aid in the threat detection process.
  • How to use telemetry to build targeted detections and enhance systems' overall security posture.
Day Johnson
Product Detection Engineer - Datadog
Day is a Detection Engineer at Datadog, researching and engineering detection mechanisms for platforms and cloud environments. In his free time, he creates cybersecurity content on his YouTube channel, CYBERWOX, and engineers Cloud DFIR CTFs, labs, and training modules to help others learn cybersecurity concepts. 
Martin McCloskey
Senior Detection Engineer - Datadog
Martin is a Senior Detection Engineer at Datadog researching and engineering detection mechanisms for platforms and cloud environments. 
Kambiz Kazemi
Staff Solutions Engineer - Google
Kambiz has 17+ years of industry experience at Cisco, VMware, Palo Alto Networks and Google. His focus is Cloud Security, technical integrations with Security ISVs and GenAI applications in cybersecurity

Register to Watch Now:

What You’ll Learn in This Webinar

You’ve probably written a hundred abstracts in your day, but have you come up with a template that really seems to resonate? Go back through your past webinar inventory and see what events produced the most registrants. Sure – this will vary by topic but what got their attention initially was the description you wrote.

Paint a mental image of the benefits of attending your webinar. Often times this can be summarized in the title of your event. Your prospects may not even make it to the body of the message, so get your point across immediately.  Capture their attention, pique their interest, and push them towards the desired action (i.e. signing up for your event). You have to make them focus and you have to do it fast. Using an active voice and bullet points is great way to do this.

Always add key takeaways. Something like this....In this session, you’ll learn about:

  • You know you’ve cringed at misspellings and improper grammar before, so don’t get caught making the same mistake.
  • Get a second or even third set of eyes to review your work.
  • It reflects on your professionalism even if it has nothing to do with your event.