Six stages of an attack: The Art of Detection

  • Webcast Aired Wednesday, 05 Apr 2017 1:00PM EDT (05 Apr 2017 17:00 UTC)
  • Speakers: Matt Bromiley, Richard Harlan

The organizations keeping customer data safe don't necessarily spend more on security, but have learned to artfully balance resources across prevent more, detect faster, mitigate more accurately, and minimize damage.

While initial network penetration is quick and difficult to detect, attackers perform a series of actions once they're inside the network, offering a window of opportunity for detection early in the attack life-cycle. This gives enterprise defenders a chance to act quickly to stop or minimize business impact. Doing threat lifecycle management effectively takes a mix of mature security processes, analyst skills, and \force multiplier" tools.

In our upcoming webinar, SANS and Cybereason will discuss the attack lifecycle post-penetration and offer an approach for successful detection.

Join us to learn:

  • A more in-depth look at the six stages of the attack lifecycle
  • How to avoid the pitfalls that cause network infiltration detection to fail
  • An effective approach for accurate detection throughout the entire attack lifecycle, not just an infiltration