Topic: Data-Driven Defense: Telemetry in Incident Response
Abstract: In today’s dynamic threat landscape, swift and informed decision-making is critical to effective incident response. Security leaders, especially CISOs, play a pivotal role in consolidating telemetry data and translating it into actionable insights for executive stakeholders. The current webinar, part of our ongoing series on the Incident Response Lifecycle, focuses on the strategic use of data-driven telemetry to enhance response capabilities and support high-stakes decision-making during security incidents. The webinar explores how real-time data collected from systems, networks, and applications, can be leveraged to enhance detection, investigation, and mitigation of security incidents. Join us to gain insights into building a resilient, data-centric defense mechanisms and learn how to transform raw telemetry into actionable intelligence. Whether you’re a incident responder, or security leader, this webinar will equip you with the tools and techniques to elevate your response capabilities through data.
Key Takeaways:
- The role of telemetry in modern cybersecurity operations
- Key sources of telemetry data and how to harness them
- Practical strategies for integrating telemetry into incident response workflows
- Real-world case studies demonstrating telemetry-driven threat detection and resolution
Speaker:
Don Warden II, Director, Incident Response, Cybolt
Bio: Don Warden is a cybersecurity leader with over 30 years of experience in defending and securing complex environments across multiple industries. His extensive background spans digital forensics, cyber threat intelligence, and incident response, wherein he has handled high-stakes cases involving ransomware, insider threats, and cyber extortion. A trusted advisor on cybersecurity strategy, Don has guided organizations through threat mitigation and recovery while ensuring compliance with frameworks like the Cybersecurity Maturity Model Certification (CMMC). Holding advanced certifications, including Certified Ethical Hacker (C|EH) and Certified Cyber Security Analyst (CCSA), along with a Master’s in Cybersecurity and Information Assurance, Don brings a seasoned perspective to AI-powered cybersecurity and ethical hacking innovations.