8 Keys to a Defensible Network Architecture And How Zeek Can Help You Get There

  • Tuesday, 06 Nov 2018 10:30AM EST (06 Nov 2018 15:30 UTC)
  • Speakers: Matt Bromiley, Richard Bejtlich

If your network architecture is largely unmapped, unmonitored and unmanned then you have a significant security risk you need to mitigate. 'Without a comprehensive inventory of your network infrastructure, an ability to make fast sense of the traffic, and established baselines of 'normal ' activity, network intrusions will go undiscovered longer or you will outright miss them.

You can't protect your network from the things you don't know about or can't see, which is why ensuring your network architecture meets key design principles such as 'Inventoried ', 'Monitored ', and 'Measured ' is critical for strong network defense.

In this webcast, Richard Bejtlich, author of The Tao of Network Security Monitoring: Beyond Intrusion Detection, and SANS Instructor Matt Bromiley, will present eight key design principles for building a defensible network architecture and show you how the Zeek network security monitoring framework can help you get there. 'Zeek, formerly known as Bro, extracts over 400 fields of data from network traffic across 35+ protocols, providing nearly the context of full packet capture at less than 1% of the file size.

Register for this webcast to learn:

  • Eight critical network architecture principles that will strengthen your defense
  • Practical guidance for implementing these design principles in your environment
  • How Zeek can help you inventory, illuminate, and benchmark your network
  • And more....