Noopur Davis, CISO, Comcast

“As a result of the security data fabric, the questions we dare to ask ourselves become more audacious each day.”

Can you improve your vulnerability scan operations to reconcile ephemeral assets?

Have you seen this IOC in your ecosystem in the past two years?

Can you alert when a non-technical employee is executing technical tasks e.g., source code access or executing admin tasks?

Are you confident in the way you automate your routine threat hunts?

Can you correlate any device, Windows event, authentication events, and EDR events across 150k+ users for the past two years in chronological order?

How long would it take you to run a full investigation spanning multiple years?

Can you detect anomalous source code repository interactions?

How do you detect concerning executions of LOLBins?

Can you detect credential sharing or compromise based on behavior patterns?

What is the typical behavior of vendors who connect to your network?

How quickly can you find owners for unknown assets in your CMBD?

Do you use the same data for continuous controls monitoring, threat hunting, and incident response?

Are there systems still operating but no longer have your security agents on them?

Can you detect credential sharing or compromise based on behavior patterns?

Do you use the same data for continuous controls monitoring, threat hunting, and incident response?

How quickly can you find owners for unknown assets in your CMBD?

How do you detect concerning executions of LOLBins?

Can you detect anomalous source code repository interactions?

What is the typical behavior of vendors who connect to your network?

Can you improve your vulnerability scan operations to reconcile ephemeral assets?

Are you confident in the way you automate your routine threat hunts?

Can you alert when a non-technical employee is executing technical tasks e.g., source code access or executing admin tasks?

Can you correlate any device, Windows event, authentication events, and EDR events across 150k+ users for the past two years in chronological order?

How long would it take you to run a full investigation spanning multiple years?

Have you seen this IOC in your ecosystem in the past two years?

Are there systems still operating but no longer have your security agents on them?

Can you correlate any device, Windows event, authentication events, and EDR events across 150k+ users for the past two years in chronological order?

Are there systems still operating but no longer have your security agents on them?

Can you detect credential sharing or compromise based on behavior patterns?

What is the typical behavior of vendors who connect to your network?

How quickly can you find owners for unknown assets in your CMBD?

How do you detect concerning executions of LOLBins?

Can you improve your vulnerability scan operations to reconcile ephemeral assets?

How long would it take you to run a full investigation spanning multiple years?

Can you detect anomalous source code repository interactions?

Have you seen this IOC in your ecosystem in the past two years?

Can you alert when a non-technical employee is executing technical tasks e.g., source code access or executing admin tasks?

Are you confident in the way you automate your routine threat hunts?

Do you use the same data for continuous controls monitoring, threat hunting, and incident response?

Are there systems still operating but no longer have your security agents on them?

Can you improve your vulnerability scan operations to reconcile ephemeral assets?

How do you detect concerning executions of LOLBins?

What is the typical behavior of vendors who connect to your network?

Do you use the same data for continuous controls monitoring, threat hunting, and incident response?

Can you alert when a non-technical employee is executing technical tasks e.g., source code access or executing admin tasks?

How quickly can you find owners for unknown assets in your CMBD?

Have you seen this IOC in your ecosystem in the past two years?

How long would it take you to run a full investigation spanning multiple years?

Can you detect anomalous source code repository interactions?

Are you confident in the way you automate your routine threat hunts?

Can you detect credential sharing or compromise based on behavior patterns?

Can you correlate any device, Windows event, authentication events, and EDR events across 150k+ users for the past two years in chronological order?

"My dream was to have vast amounts of relevant security data easily actionable within minutes and hours—not days or weeks—and we’ve achieved that using a security data fabric"

— Noopur Davis, CISO, Comcast
DataBee® podcast

Free the CISO

Listen on
SpotifyApple PodcastsYouTube Music