Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Automate Security Response with Datadog Workflow Automation

Responding to threats often requires time-consuming, multi-step actions across multiple tools, slowing down investigations and increasing risk. Learn how security teams can automate a wide range of workflows, from everyday tasks to complex, multi-step investigations, so they can streamline response and reduce manual effort across tools and environments. In this demo, see how Datadog’s integrated SOAR, powered by Workflow Automation, helps you build, test, and manage automated security playbooks with confidence.

Enrich, Parse, and Control Logs with Observability Pipelines for Datadog Cloud SIEM

See how Datadog Observability Pipelines helps security and operations teams take control of their log data. In this demo, we’ll walk through: With Datadog, you can normalize, enrich, and prepare high-quality log data for Cloud SIEM, supporting faster investigations, more accurate detections, and reduced operational overhead—all without third-party software.

Real-Time & Historical Threat Detection with Datadog Cloud SIEM

See how Datadog’s Cloud SIEM empowers security teams with powerful, real-time and retrospective detection capabilities. In this demo, we walk through: Datadog Cloud SIEM gives your SOC high-context, actionable security signals—out of the box and fully customizable—helping you detect, investigate, and respond to threats faster.

PII Exposed in Your Logs? Fix It Fast With Observability Pipelines

Help keep your logs secure before they leave your environment. In this video, we’ll show you how to use Datadog Observability Pipelines to easily discover, classify, and mange sensitive information—like PCI, PII, or custom patterns—from your logs on-premise to support compliance needs. You’ll learn how to: Whether you’re in DevOps, Security, or Compliance, this workflow helps support your data privacy initiatives without disrupting your existing logging setup.

Bits AI Security Analyst: Automate Cloud SIEM investigations

Datadog's Bits AI Security Analyst transforms the way security teams handle investigations by autonomously triaging Datadog Cloud SIEM signals. Built natively in Datadog, it conducts in-depth investigations of potential threats and delivers clear, actionable recommendations. With context-rich guidance for mitigation, security teams can stay ahead of evolving threats with greater efficiency and precision.

Navigating Identity and Security in the Age of Agentic AI

As AI agents rapidly improve, becoming more autonomous and interconnected, they unlock new ways to assist us. But as they perform actions for us and delegate tasks to other AI agents, we need to reexamine our understanding of “identity.” How do we ensure these powerful AI interactions are authentic, authorized, and permissioned, while differentiating between legitimate actions and potential misuse?Join Datadog co-founder and CTO Alexis Lê-Quôc and Okta CTO Bhawna Singh as they explore the convergence of AI, security, and observability.

Security and SRE: An Example from Datadog's Combined Approach

In most companies, Security and SRE organizations are distinctly separate entities and often fall under different executive branches of the company. The work of Security and SRE organizations may appear different, but their goals are the same: keep the company running. This separated structure hinders collaboration, but what if you could change it? Over the past year, Datadog has joined our SRE and Security teams together in a single organization unifying all aspects of reliability.

Cybersecurity Modernization Summit: Moving From Reactive Threat Detection and Response to Proactive

Jake Williams, SVP of Modernization at Scoop News Group and Datadog VP Bianca Lankford for a conversation to learn more about how real-time threat detection paired with rich observability insights is helping organizations to achieve faster security outcomes. This conversation will also address the role auto-remediation plays in the future of government cybersecurity.