Unraveling the Threat: Expanding Response Processes and Procedures Beyond the Moment of Discovery

  • Webcast Aired Monday, 23 Mar 2015 3:00PM EDT (23 Mar 2015 19:00 UTC)
  • Speaker: Ben Johnson

Many endpoint threat detection and response solutions reactively collect the necessary data for a response after detection—extending the dwell time of advanced and targeted threats. A new approach is required. One that focuses on the proactive collection and monitoring of the necessary data required for effective response. Join Ben Johnson, chief security strategist for Bit9 + Carbon Black, to learn:

  • How to prepare for a data breach with a proactive, gapless recording of every endpoint in your environment
  • How to optimize and customize your detection capabilities beyond just signatures or indicators of compromise (IOC)
  • How applied threat intelligence can improve your detection and response efforts through data understanding
  • How to streamline your threat containment and remediation efforts through live response capabilities