DiscoverCloud Security Podcast by GoogleEP234 The SIEM Paradox: Logs, Lies, and Failing to Detect
EP234 The SIEM Paradox: Logs, Lies, and Failing to Detect

EP234 The SIEM Paradox: Logs, Lies, and Failing to Detect

Update: 2025-07-14
Share

Description

Guest:

Topics:

  • Why do so many organizations still collect logs yet don't detect threats? In other words, why is our industry spending more money than ever on SIEM tooling and still not "winning" against Tier 1 ... or even Tier 5 adversaries? 
  • What are the hardest parts about getting the right context into a SOC analyst's face when they're triaging and investigating an alert? Is it integration? SOAR playbook development? Data enrichment? All of the above?
  • What are the organizational problems that keep organizations from getting the full benefit of the security operations tools they're buying?
  • Top SIEM mistakes? Is it trying to migrate too fast? Is it accepting a too slow migration? In other words, where are expectations tyrannical for customers? Have they changed much since 2015?
  • Do you expect people to write their own detections? Detecting engineering seems popular with elite clients and nobody else, what can we do?
  • Do you think AI will change how we SOC (Tim: "SOC" is not a verb?) in the next 1- 3 -5 years? 
  • Do you think that AI SOC tech is repeating the mistakes SOAR vendors made 10 years ago? Are we making the same mistakes all over again? Are we making new mistakes? 

Resources:

Comments 
In Channel
loading
00:00
00:00
x

0.5x

0.8x

1.0x

1.25x

1.5x

2.0x

3.0x

Sleep Timer

Off

End of Episode

5 Minutes

10 Minutes

15 Minutes

30 Minutes

45 Minutes

60 Minutes

120 Minutes

EP234 The SIEM Paradox: Logs, Lies, and Failing to Detect

EP234 The SIEM Paradox: Logs, Lies, and Failing to Detect

Anton A Chuvakin