Practical uses for AI for improving threat monitoring and incident response

Anna Webb, Head of Security Operations, Kocho

Cut through the AI hype, and discover practical use cases for AI and how you can put it to use to protect your organisation. Anna Webb (Kocho’s Head of Security Operations) will showcase Microsoft’s latest AI capabilities in Copilot, Sentinel and Defender, and show how they can be used holistically to improve visibility of threats and effectiveness of response.

Anna will step through some typical scenarios, including:

  • Streamlining incident response data into digestible plain English reports.
  • Targeted threat hunting with Kusto Query Language (KQL) development.
  • Producing comprehensive emerging threat reports and recommended mitigating actions.

Also discover how a Microsoft based managed security operations service can relieve internal pressures on skills, resources, budgets and more.

Follow us on social

Keep up to date with what's going on by following us on social media.

Featured blogs

Read the latest news and views from key industry figures and thought leaders.

What’s New In The Cato CTRL SASE Threat Report?
Cato’s Cyber Threat Research Lab (Cato CTRL) recently unveiled its first SASE threat report, issuing a comprehensive and exhausting insight into issues and insights with enterprise and network threats.  Based on Cato’s ability to analyse networks extensively and granularly, the report pinpoints threats by combining strategic, tactical, and operational standpoints via the MITRE ATT&CK framework....
Platform-Wide AI and Enterprise Security: The Recall Issue
Whenever an AI product due for rollout is delayed suddenly, many questions begin circulating in the media. The official reasoning why will open the floodgates of many people online spouting their ideas of what the problem has been. Microsoft has recently revealed the delay of their controversial artificial intelligence (AI) powered Recall feature for Copilot+PCs....
Enterprise Security
Incognito Mode Won’t Protect Your Enterprise Security
Many enterprises have set a precedent that online browsing within IT departments or other company-based computers should be performed under incognito windows, such as those offered by Google Chrome browsers and other providers. While online search and work activity may feel secure with your identity and preferences set to a private mode, according to research...