From guessing a weak password to exploiting zero-day vulnerabilities, there are a lot of ways attackers can get into your private networks. So even if you follow all the best security practices, there’s a good chance you will face a security incident sooner or later. The questions are: how quickly will you find out? how will you respond? how will you know which systems are compromised? In this talk, we’ll show you how to use the Elastic Stack, and in particular Beats, to detect security breaches.