Five Ways to Find an Active Attacker

Logo
Presented by

Kasey Cross, Sr. Product Marketing Manager and Bryan Lee, Unit 42 Principal Researcher,

About this talk

Today’s attackers are using elusive tactics like leveraging stolen credentials and managing compromised systems from the internet. That said, it’s possible to locate and stop attackers from within your infrastructure with the help of automated detection and response. Watch the webinar as Palo Alto Networks' Bryan Lee, Unit 42 Principal Researcher, and Kasey Cross, Sr. Product Marketing Manager, explain in detail: ●Best practices to detect and stop sophisticated attacks ●Five tactics attackers often use to find, access and steal data ●How to identify highly-evasive as well as low and slow attacks Join us on April 30 at 11:15 a.m. PT for the webcast and live Q&A session.
Related topics:

More from this channel

Upcoming talks (0)
On-demand talks (853)
Subscribers (104244)
Palo Alto Networks is the next-generation security company, leading a new era in cybersecurity by safely enabling applications and preventing cyber breaches for tens of thousands of organizations worldwide. Built with an innovative approach and highly differentiated cyberthreat prevention capabilities, our game-changing security platform delivers security far superior to legacy or point products, safely enables daily business operations, and protects an organization's most valuable assets. Find out more at www.paloaltonetworks.com or call us at 1-877-524-1031.