Join us for an hour-long panel on the intricacies of XDR and how it will affect the security industry. Learn what XDR is, specific use cases, and how security practitioners can easily integrate this new technology into their security stack.

Watch Now

About the Webinar

Our guest panel includes experts from the security industry, with special guest Mike Rothman, Sam Curry, and Yonatan Striem-Amit.


In this session, you will learn:


- If XDR really is the silver bullet we’ve been told
- What to keep in mind when looking at XDR solutions
- What the tradeoffs are when implementing XDR
- What comes next after XDR


Feel free to submit questions ahead of this great conversation and we will get them answered.


Allie Mellen writes about security at Cybereason. She has several years of experience in cybersecurity and has been recognized globally for her security research. She has a B.S. degree in Computer Engineering and has had various engineering, development, and consulting roles in the technology sector over the past ten years.


Sam Curry has over 25 years of IT security industry experience and is a Visiting Fellow at the National Security Institute. Sam most recently served as CTO, CSO and GM at Arbor Networks. Previously, he spent more than seven years at RSA (the Security Division of EMC) in a variety of senior management roles, including CTO, SVP of Product and Head of RSA Labs. In addition to other media. Sam has also held senior management roles at Microstrategy, Computer Associates, and McAfee in addition to co-founder and first employee of two successful security startups.


Yonatan Striem-Amit is a machine learning, big data analytics, reverse engineering and cyber security expert, with over a decade of experience building highly sophisticated custom solutions to cyber for governmental agencies. Prior to founding Cybereason, Yonatan headed the development for Watchdox, a leading DRM and SaaS security startup.


Mike’s bold perspectives and irreverent style are invaluable as companies determine effective strategies to grapple with the dynamic security threatscape. Mike specializes in the sexy aspects of security, like protecting networks and endpoints, security management, and compliance. He also possesses a very expensive engineering degree in Operations Research and Industrial Engineering from Cornell University. His folks are overjoyed that he uses literally zero percent of his education on a daily basis. He can be reached at