Although layered security can strengthen defenses and deter casual attackers, what can one do when the inevitable breach does occur? Advanced persistent threats can morph while they move through a network, easily foiling signature-based tools that only know what the attack used to look like. This webcast discusses the detection and response measures that correspond to each phase of an advanced attack, from essential best practices to sophisticated defense strategies that can be built into a network design.
Sign up for this webcast and be among the first to receive an advance copy of a SANS whitepaper discussing the detection and response of advanced threats.
Please send questions about this webcast to email@example.com.
View the associated whitepaper.