* Understanding IAM logs. * First line of defense as a concept * Best practices for real-life implementation * Security analysts * SOC teams * IAM and IT administrators