RESOURCES
Videos
[{"id":3959,"link":"https:\/\/www.query.ai\/resources\/webinars\/security-operations-in-a-post-ai-world\/","name":"security-operations-in-a-post-ai-world","thumbnail":{"url":"https:\/\/www.query.ai\/wp-content\/uploads\/2025\/05\/sdoc-ep17_tmb.jpg","alt":"secdataopscast episode 17 thumbnail"},"title":"Security Operations in a Post-AI World","author":{"name":"Query","link":"https:\/\/www.query.ai\/resources\/author\/query\/"},"date":"May 9, 2025","dateGMT":"2025-05-09 18:46:15","modifiedDate":"2025-05-09 14:46:17","modifiedDateGMT":"2025-05-09 18:46:17","commentCount":"0","commentStatus":"closed","categories":{"coma":"<a href=\"https:\/\/www.query.ai\/resources\/category\/videos\/\" rel=\"category tag\">Videos<\/a>, <a href=\"https:\/\/www.query.ai\/resources\/category\/webinars\/\" rel=\"category tag\">Webinars<\/a>","space":"<a href=\"https:\/\/www.query.ai\/resources\/category\/videos\/\" rel=\"category tag\">Videos<\/a> <a href=\"https:\/\/www.query.ai\/resources\/category\/webinars\/\" rel=\"category tag\">Webinars<\/a>"},"taxonomies":{"post_tag":""},"readTime":{"min":0,"sec":40},"status":"publish","content":"Join Neal Bridges on this episode of SecDataOpsCast as he sits down with cybersecurity veteran Alan White, an 18-year Army"},{"id":3904,"link":"https:\/\/www.query.ai\/resources\/videos\/query-copilot-for-configure-schema\/","name":"query-copilot-for-configure-schema","thumbnail":{"url":"https:\/\/www.query.ai\/wp-content\/uploads\/2025\/04\/query-copilot-for-configure-schema.jpg","alt":"query copilot for configure schema video thumbnail"},"title":"Query CoPilot for Configure Schema","author":{"name":"Query","link":"https:\/\/www.query.ai\/resources\/author\/query\/"},"date":"Apr 17, 2025","dateGMT":"2025-04-17 15:57:38","modifiedDate":"2025-04-17 11:57:40","modifiedDateGMT":"2025-04-17 15:57:40","commentCount":"0","commentStatus":"open","categories":{"coma":"<a href=\"https:\/\/www.query.ai\/resources\/category\/videos\/\" rel=\"category tag\">Videos<\/a>","space":"<a href=\"https:\/\/www.query.ai\/resources\/category\/videos\/\" rel=\"category tag\">Videos<\/a>"},"taxonomies":{"post_tag":""},"readTime":{"min":0,"sec":28},"status":"publish","content":"Learn how to map Okta authentication events stored in Snowflake into the Open Cybersecurity Schema Framework using Query Copilot for"},{"id":3888,"link":"https:\/\/www.query.ai\/resources\/webinars\/secdataopscast-fight-night-ai-in-the-soc\/","name":"secdataopscast-fight-night-ai-in-the-soc","thumbnail":{"url":"https:\/\/www.query.ai\/wp-content\/uploads\/2025\/04\/2025-04-10_SDOC-Fight-Night_tmb.jpg","alt":"SecDataOpsCast Fight Night thumbnail"},"title":"SecDataOpsCast Fight Night \u2014 AI in the SOC","author":{"name":"Query","link":"https:\/\/www.query.ai\/resources\/author\/query\/"},"date":"Apr 14, 2025","dateGMT":"2025-04-14 20:36:45","modifiedDate":"2025-04-14 16:46:51","modifiedDateGMT":"2025-04-14 20:46:51","commentCount":"0","commentStatus":"closed","categories":{"coma":"<a href=\"https:\/\/www.query.ai\/resources\/category\/videos\/\" rel=\"category tag\">Videos<\/a>, <a href=\"https:\/\/www.query.ai\/resources\/category\/webinars\/\" rel=\"category tag\">Webinars<\/a>","space":"<a href=\"https:\/\/www.query.ai\/resources\/category\/videos\/\" rel=\"category tag\">Videos<\/a> <a href=\"https:\/\/www.query.ai\/resources\/category\/webinars\/\" rel=\"category tag\">Webinars<\/a>"},"taxonomies":{"post_tag":""},"readTime":{"min":0,"sec":31},"status":"publish","content":"Welcome to a special edition of the #SecDataOpsCast, where things are about to get real. In this no-holds-barred episode, host"},{"id":3831,"link":"https:\/\/www.query.ai\/resources\/webinars\/secdataopscast-workshop-part-2-analysis-phase\/","name":"secdataopscast-workshop-part-2-analysis-phase","thumbnail":{"url":"https:\/\/www.query.ai\/wp-content\/uploads\/2025\/03\/2025-03-20_SDOC15_tmb.jpg","alt":"secdataopscast episode 15 thumbnail"},"title":"SecDataOps Workshop p2: Something About the Analysis Phase","author":{"name":"Query","link":"https:\/\/www.query.ai\/resources\/author\/query\/"},"date":"Mar 24, 2025","dateGMT":"2025-03-24 20:29:16","modifiedDate":"2025-03-24 16:29:17","modifiedDateGMT":"2025-03-24 20:29:17","commentCount":"0","commentStatus":"closed","categories":{"coma":"<a href=\"https:\/\/www.query.ai\/resources\/category\/videos\/\" rel=\"category tag\">Videos<\/a>, <a href=\"https:\/\/www.query.ai\/resources\/category\/webinars\/\" rel=\"category tag\">Webinars<\/a>","space":"<a href=\"https:\/\/www.query.ai\/resources\/category\/videos\/\" rel=\"category tag\">Videos<\/a> <a href=\"https:\/\/www.query.ai\/resources\/category\/webinars\/\" rel=\"category tag\">Webinars<\/a>"},"taxonomies":{"post_tag":""},"readTime":{"min":0,"sec":28},"status":"publish","content":"In this episode of SecDataOpsCast, Neal Bridges and Jonathan Rau take a deep dive into the evolving world of security"},{"id":3756,"link":"https:\/\/www.query.ai\/resources\/webinars\/secdataopscast-security-vs-the-business\/","name":"secdataopscast-security-vs-the-business","thumbnail":{"url":"https:\/\/www.query.ai\/wp-content\/uploads\/2025\/02\/2024-02-13_SDOC-ep14_tmb.jpg","alt":"secdataopscast episode 14 screenshot"},"title":"Security vs The Business: Finding the Balance","author":{"name":"Query","link":"https:\/\/www.query.ai\/resources\/author\/query\/"},"date":"Feb 13, 2025","dateGMT":"2025-02-13 20:00:00","modifiedDate":"2025-02-14 09:15:06","modifiedDateGMT":"2025-02-14 14:15:06","commentCount":"0","commentStatus":"closed","categories":{"coma":"<a href=\"https:\/\/www.query.ai\/resources\/category\/videos\/\" rel=\"category tag\">Videos<\/a>, <a href=\"https:\/\/www.query.ai\/resources\/category\/webinars\/\" rel=\"category tag\">Webinars<\/a>","space":"<a href=\"https:\/\/www.query.ai\/resources\/category\/videos\/\" rel=\"category tag\">Videos<\/a> <a href=\"https:\/\/www.query.ai\/resources\/category\/webinars\/\" rel=\"category tag\">Webinars<\/a>"},"taxonomies":{"post_tag":""},"readTime":{"min":0,"sec":12},"status":"publish","content":"Being a CISO means constantly walking a tightrope while balancing technology, business goals, and risk. But how do you make"},{"id":3670,"link":"https:\/\/www.query.ai\/resources\/webinars\/secdataopscast-welcome-to-2025\/","name":"secdataopscast-welcome-to-2025","thumbnail":{"url":"https:\/\/www.query.ai\/wp-content\/uploads\/2025\/01\/2025-01-09_SDOCast_ep_13._tmb.jpg","alt":"SecDataOpsCast episode 13 thumbnail"},"title":"Welcome to 2025","author":{"name":"Query","link":"https:\/\/www.query.ai\/resources\/author\/query\/"},"date":"Jan 9, 2025","dateGMT":"2025-01-10 04:21:06","modifiedDate":"2025-01-09 23:21:08","modifiedDateGMT":"2025-01-10 04:21:08","commentCount":"0","commentStatus":"closed","categories":{"coma":"<a href=\"https:\/\/www.query.ai\/resources\/category\/videos\/\" rel=\"category tag\">Videos<\/a>, <a href=\"https:\/\/www.query.ai\/resources\/category\/webinars\/\" rel=\"category tag\">Webinars<\/a>","space":"<a href=\"https:\/\/www.query.ai\/resources\/category\/videos\/\" rel=\"category tag\">Videos<\/a> <a href=\"https:\/\/www.query.ai\/resources\/category\/webinars\/\" rel=\"category tag\">Webinars<\/a>"},"taxonomies":{"post_tag":""},"readTime":{"min":0,"sec":7},"status":"publish","content":"Hear Query CISO Neal Bridges and Query CEO Matt Eberhart pick on insights, reflections, and predictions Let's kick off 2025"},{"id":3650,"link":"https:\/\/www.query.ai\/resources\/webinars\/secdataopscast-why-do-security-products-suck\/","name":"secdataopscast-why-do-security-products-suck","thumbnail":{"url":"https:\/\/www.query.ai\/wp-content\/uploads\/2024\/12\/secdataopscast_ep12_tmb.jpg","alt":"SecDataOpsCast episode 12"},"title":"Why Do Security Products Suck?","author":{"name":"Query","link":"https:\/\/www.query.ai\/resources\/author\/query\/"},"date":"Dec 19, 2024","dateGMT":"2024-12-20 01:26:05","modifiedDate":"2024-12-21 09:20:27","modifiedDateGMT":"2024-12-21 14:20:27","commentCount":"0","commentStatus":"closed","categories":{"coma":"<a href=\"https:\/\/www.query.ai\/resources\/category\/videos\/\" rel=\"category tag\">Videos<\/a>, <a href=\"https:\/\/www.query.ai\/resources\/category\/webinars\/\" rel=\"category tag\">Webinars<\/a>","space":"<a href=\"https:\/\/www.query.ai\/resources\/category\/videos\/\" rel=\"category tag\">Videos<\/a> <a href=\"https:\/\/www.query.ai\/resources\/category\/webinars\/\" rel=\"category tag\">Webinars<\/a>"},"taxonomies":{"post_tag":""},"readTime":{"min":0,"sec":22},"status":"publish","content":"Ever feel like security products are doomed from the start? In this episode of the SecDataOpsCast, Neal Bridges, Mike Bousquet,"},{"id":3573,"link":"https:\/\/www.query.ai\/resources\/webinars\/secdataopscast-more-data-in-the-soc-dream-or-nightmare\/","name":"secdataopscast-more-data-in-the-soc-dream-or-nightmare","thumbnail":{"url":"https:\/\/www.query.ai\/wp-content\/uploads\/2024\/11\/2024-11-21_SDOC_ep11_tmb.png","alt":"secdataopscast episode 11"},"title":"SecDataOpsCast: More Data in the SOC: Dream or Nightmare?","author":{"name":"Query","link":"https:\/\/www.query.ai\/resources\/author\/query\/"},"date":"Nov 22, 2024","dateGMT":"2024-11-22 21:04:18","modifiedDate":"2024-11-22 16:12:58","modifiedDateGMT":"2024-11-22 21:12:58","commentCount":"0","commentStatus":"closed","categories":{"coma":"<a href=\"https:\/\/www.query.ai\/resources\/category\/videos\/\" rel=\"category tag\">Videos<\/a>, <a href=\"https:\/\/www.query.ai\/resources\/category\/webinars\/\" rel=\"category tag\">Webinars<\/a>","space":"<a href=\"https:\/\/www.query.ai\/resources\/category\/videos\/\" rel=\"category tag\">Videos<\/a> <a href=\"https:\/\/www.query.ai\/resources\/category\/webinars\/\" rel=\"category tag\">Webinars<\/a>"},"taxonomies":{"post_tag":""},"readTime":{"min":0,"sec":21},"status":"publish","content":"On this episode of #SecDataOpsCast, BitLyft Cybersecurity Director of SOC Noah Hoag sat down with Query CISO Neal Bridges to"},{"id":3530,"link":"https:\/\/www.query.ai\/resources\/webinars\/navigating-emerging-technologies-ai-for-security\/","name":"navigating-emerging-technologies-ai-for-security","thumbnail":{"url":"https:\/\/www.query.ai\/wp-content\/uploads\/2024\/11\/2024-10-24_tmb.png","alt":"cisco investments query webinar"},"title":"Cisco Investments Navigating Emerging Technologies \u2014 AI for Security: Matt Eberhart","author":{"name":"Query","link":"https:\/\/www.query.ai\/resources\/author\/query\/"},"date":"Nov 12, 2024","dateGMT":"2024-11-13 02:20:01","modifiedDate":"2024-11-12 21:20:03","modifiedDateGMT":"2024-11-13 02:20:03","commentCount":"0","commentStatus":"closed","categories":{"coma":"<a href=\"https:\/\/www.query.ai\/resources\/category\/videos\/\" rel=\"category tag\">Videos<\/a>, <a href=\"https:\/\/www.query.ai\/resources\/category\/webinars\/\" rel=\"category tag\">Webinars<\/a>","space":"<a href=\"https:\/\/www.query.ai\/resources\/category\/videos\/\" rel=\"category tag\">Videos<\/a> <a href=\"https:\/\/www.query.ai\/resources\/category\/webinars\/\" rel=\"category tag\">Webinars<\/a>"},"taxonomies":{"post_tag":""},"readTime":{"min":0,"sec":26},"status":"publish","content":"Innovation Unleashed: Navigating Emerging Technologies \u2013 AI for Security \/ Security for AI features experts from Cisco, Cisco Investments, Query,"}]