EcoCast By ActualTech Media Detecting, Investigating, and Responding to Threats: Best Practices

Featuring

  • Progress Software
  • SentinelOne
  • Wiz
  • Cohesity
  • Okta

About This EcoCast

As the speed of cyberattacks accelerates through the use of generative AI, traditional static playbooks are no longer sufficient to maintain organizational resilience. This EcoCast provides a deep exploration of modern security operations center methodologies that unify detection, investigation, and response into a single, seamless motion. We examine how next-generation XDR, AI-driven SIEM platforms and other technologies prioritize high-impact alerts by correlating identity signals with behavioral telemetry across cloud and hybrid environments.

IT professionals and managers will learn how to transition from manual triage to automated "agentic" workflows that can autonomously contain threats like ransomware and MFA bypass attempts. By focusing on practical strategies for reducing alert fatigue and closing visibility gaps at the edge, this session equips decision-makers with the technical criteria to evaluate solutions that offer true forensic clarity.

Join us to discover how to build a proactive defense that outpaces sophisticated adversaries in 2026.

  1. Allan Liska

    Guest Speaker Allan Liska Ransomware Expert and Industry Veteran

  2. Jason Alberino

    Featuring Jason Alberino Principal Product Manager Progress Software

  3. Greg Collins

    Featuring Greg Collins Sr. Product Marketing Manager Progress Software

  4. Anthony La Scala

    Featuring Anthony La Scala Technical Evangelist SentinelOne

  5. Raaz Herzberg

    Featuring Raaz Herzberg VP of Product Strategy Wiz

  6. Arie Zilberstsein

    Featuring Arie Zilberstsein VP of Cloud Detection Wiz

  7. Jared Ruckle

    Featuring Jared Ruckle Senior Director, Product Marketing Cohesity

  8. Ariel Zommer

    Featuring Ariel Zommer Staff Product Marketing Manager, Security Okta

  9. Jyotsna Raghunathan

    Featuring Jyotsna Raghunathan Principal Product Acceleration Specialist Okta

What You'll Learn

  1. Discover identity-centric detection techniques to prevent sophisticated credential and token abuse
  2. Reduce operational alert fatigue by implementing risk-based prioritization and automated triage
  3. Identify critical visibility gaps across your cloud, edge, and remote workloads