Employees are NOT the weakest link – their activity is simply invisible to most SOC teams. Why? Because firewalls, windows log files, IOCs from EDRs do not capture the meta-data that tells the story of – and verifies – how, when, why and where humans drive interactions with endpoints, servers, data and applications.

Join James Young, Security Strategist with Splunk, and Rajan Koo, DTEX Chief Customer Success Officer, as they explore Zero-Trust, the Next-Gen SOC, and Internal Threat Intelligence. They’ll examine and detail:


  • Zero-Trust & SOC Transformation
  • The 12 elements of human cyber telemetry
  • Indicators of Intent vs. IOCs and IOAs
  • SOC enrichment use cases such as anomaly detection, peer group profiling automation, user logic correlation and behavioral risk scoring
DO NOT EDIT