How to Detect System Compromise & Data Exfiltration with AlienVault USM

  • Webcast Aired Friday, 06 Nov 2015 1:00PM EST (06 Nov 2015 18:00 UTC)
  • Speaker: Tom D'Aquino

Have you ever wondered how the bad guys actually get control of a system? And, how they convert that system into a data-syphoning droid? Join AlienVault security engineer, Tom D'Aquino as he walks you through the steps of a system compromise, including how AlienVault USM detects these nefarious activities. You'll learn:

  • How attackers exploit vulnerabilities to take control of systems
  • What they do next to find & exfiltrate valuable data
  • How to catch them before the damage is done with AlienVault USM
  • Using a real-world example of a common vulnerability, Mark will show you how USM gives you the evidence you need to stop an attack in its tracks.