Data-Driven Defense: Telemetry in Incident Response

You are here:
Date: September 23, 2025
Time: 8:30 AM CDT | 9:30 AM EDT | 7:00 PM IST

Topic: Data-Driven Defense: Telemetry in Incident Response

Register

Abstract: In today’s dynamic threat landscape, swift and informed decision-making is critical to effective incident response. Security leaders, especially CISOs, play a pivotal role in consolidating telemetry data and translating it into actionable insights for executive stakeholders. The current webinar, part of our ongoing series on the Incident Response Lifecycle, focuses on the strategic use of data-driven telemetry to enhance response capabilities and support high-stakes decision-making during security incidents. The webinar explores how real-time data collected from systems, networks, and applications, can be leveraged to enhance detection, investigation, and mitigation of security incidents. Join us to gain insights into building a resilient, data-centric defense mechanisms and learn how to transform raw telemetry into actionable intelligence. Whether you’re a incident responder, or security leader, this webinar will equip you with the tools and techniques to elevate your response capabilities through data.

Key Takeaways: 

  • The role of telemetry in modern cybersecurity operations
  • Key sources of telemetry data and how to harness them
  • Practical strategies for integrating telemetry into incident response workflows
  • Real-world case studies demonstrating telemetry-driven threat detection and resolution

Speaker:

Don Warden II, Director, Incident Response, Cybolt

Bio: Don Warden is a cybersecurity leader with over 30 years of experience in defending and securing complex environments across multiple industries. His extensive background spans digital forensics, cyber threat intelligence, and incident response, wherein he has handled high-stakes cases involving ransomware, insider threats, and cyber extortion. A trusted advisor on cybersecurity strategy, Don has guided organizations through threat mitigation and recovery while ensuring compliance with frameworks like the Cybersecurity Maturity Model Certification (CMMC). Holding advanced certifications, including Certified Ethical Hacker (C|EH) and Certified Cyber Security Analyst (CCSA), along with a Master’s in Cybersecurity and Information Assurance, Don brings a seasoned perspective to AI-powered cybersecurity and ethical hacking innovations.

Share this Article

Facebook
Twitter
LinkedIn
WhatsApp
Pinterest

You may also like

Train with EC-Council

  • By clicking the Submit button, I give my consent to the processing of my personal data, including for promotional purposes, as provided in the Privacy Policy, and agree to the Terms.

Cyber Talks
Recent Posts