Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Datadog Detect (October 30, 2025)

Datadog Detect is a virtual mini-conference dedicated to helping security teams modernize detection and response by applying engineering best practices. Hear talks from industry experts, including security researchers and engineers at Datadog, Red Canary, and Corelight to learn about building scalable, effective security operations.

The Goldilocks Approach: Finding Detections That Are Just Right

In this talk, Megan Roddie-Fonseca, Sr. Security Engineer at Datadog, addresses the challenge of finding "just right" detections, leveraging data classification techniques like recall and precision to balance false positives and missed attacks. Presented on October 30, 2025 for Datadog Detect.

Silence of the Daemons: Why Evasion Isn't About Location and NDR's Role in the Cloud

In this talk, David Burkett, Cloud Security Researcher at Corelight, highlights how timeless evasion tactics create critical blind spots in cloud workloads, and illustrates the role of Network Detection and Response (NDR) as a resilient countermeasure. Presented on October 30, 2025 for Datadog Detect.

Automate Security Response with Datadog Workflow Automation

Responding to threats often requires time-consuming, multi-step actions across multiple tools, slowing down investigations and increasing risk. Learn how security teams can automate a wide range of workflows, from everyday tasks to complex, multi-step investigations, so they can streamline response and reduce manual effort across tools and environments. In this demo, see how Datadog’s integrated SOAR, powered by Workflow Automation, helps you build, test, and manage automated security playbooks with confidence.

Enrich, Parse, and Control Logs with Observability Pipelines for Datadog Cloud SIEM

See how Datadog Observability Pipelines helps security and operations teams take control of their log data. In this demo, we’ll walk through: With Datadog, you can normalize, enrich, and prepare high-quality log data for Cloud SIEM, supporting faster investigations, more accurate detections, and reduced operational overhead—all without third-party software.

Real-Time & Historical Threat Detection with Datadog Cloud SIEM

See how Datadog’s Cloud SIEM empowers security teams with powerful, real-time and retrospective detection capabilities. In this demo, we walk through: Datadog Cloud SIEM gives your SOC high-context, actionable security signals—out of the box and fully customizable—helping you detect, investigate, and respond to threats faster.

PII Exposed in Your Logs? Fix It Fast With Observability Pipelines

Help keep your logs secure before they leave your environment. In this video, we’ll show you how to use Datadog Observability Pipelines to easily discover, classify, and mange sensitive information—like PCI, PII, or custom patterns—from your logs on-premise to support compliance needs. You’ll learn how to: Whether you’re in DevOps, Security, or Compliance, this workflow helps support your data privacy initiatives without disrupting your existing logging setup.

Bits AI Security Analyst: Automate Cloud SIEM investigations

Datadog's Bits AI Security Analyst transforms the way security teams handle investigations by autonomously triaging Datadog Cloud SIEM signals. Built natively in Datadog, it conducts in-depth investigations of potential threats and delivers clear, actionable recommendations. With context-rich guidance for mitigation, security teams can stay ahead of evolving threats with greater efficiency and precision.

Navigating Identity and Security in the Age of Agentic AI

As AI agents rapidly improve, becoming more autonomous and interconnected, they unlock new ways to assist us. But as they perform actions for us and delegate tasks to other AI agents, we need to reexamine our understanding of “identity.” How do we ensure these powerful AI interactions are authentic, authorized, and permissioned, while differentiating between legitimate actions and potential misuse?Join Datadog co-founder and CTO Alexis Lê-Quôc and Okta CTO Bhawna Singh as they explore the convergence of AI, security, and observability.

Security and SRE: An Example from Datadog's Combined Approach

In most companies, Security and SRE organizations are distinctly separate entities and often fall under different executive branches of the company. The work of Security and SRE organizations may appear different, but their goals are the same: keep the company running. This separated structure hinders collaboration, but what if you could change it? Over the past year, Datadog has joined our SRE and Security teams together in a single organization unifying all aspects of reliability.