Suspicious user and machine behavior insights from logs using exploratory ML
Security rules can identify known patterns of suspicious behavior but may not generalize to detecting novel threats. Fully autonomous Machine Learning or AI approaches are powerful, but can be noisy due to lack of human context and judgment. In this session, you will learn how to detect and investigate suspicious user and machine behaviors using advanced ML algorithms interactively, empowering you to iteratively uncover patterns hidden in large quantities of log data.