Under Threat or Compromise: Every Detail Counts

  • Wednesday, 20 Aug 2014 1:00PM EDT (20 Aug 2014 17:00 UTC)
  • Speakers: Jacob Williams, John Vecchi

When it comes to cybersecurity threats, prevention is the ultimate goal, but a bullet-proof network is largely unattainable. Even large organizations with resources are repeatedly ending up in the news as victims of cyber attacks.

Time to face the music: Your company's assets will be compromised sooner or later. In fact, according to the 2014 SANS endpoint security survey, most companies are now operating under the presumption of compromise.

This webcast will discuss prevention, detection and mitigation through the use of a five-stage system lifecycle defense model:

  • Start with protection
  • Plan with detection
  • Investigate and analyze with intelligence
  • Contain and mitigate
  • Remediate the vulnerability

Modern-day security analytics and full network capture will be discussed as a means to achieve these ends, along with guidance on how to know if you caught the bad guys and ejected them, and how to stop them from returning.

Click here to view the associated whitepaper.