SEC595: Applied Data Science and AI/Machine Learning for Cybersecurity Professionals


Experience SANS training through course previews.
Learn MoreLet us help.
Contact usBecome a member for instant access to our free resources.
Sign UpWe're here to help.
Contact Us
Can your NDR solution protect you from zero-day threats before you become the next headline?
This discussion will explore the salient requirements for NDR and other approaches as critical cybersecurity technologies. Investments in NDR, SIEM, EDR, and perimeter prevention alone are not enough to stop modern-day cyber-attacks. These tools lack network context, a fundamental requirement for achieving cybersecurity. NDR bolsters every phase of a SOC's maturity and an organization's maturity model. That said, not all NDR is created equal. This discussion will expose the characteristics of Advanced NDR that are most important to your cybersecurity operations.
Examples of NDR Characteristics Explored in this Discussion
The incompleteness of the network data in your current cybersecurity stack could be decreasing your overall efficiency and effectiveness as a cyber organization. Join Us To Learn More.


As director of technical marketing at NETSCOUT, Mark Doering supports security product development and the implementation of enterprise security solutions, engaging with NETSCOUT field sales and NETSCOUT customers as an advocate for the best architecture to achieve the desired outcome.
Read more about Mark Doering