Five Ways to Find an Active Attacker

Logo
Presented by

Kasey Cross, Sr. Product Marketing Manager and Bryan Lee, Unit 42 Principal Researcher,

About this talk

You can locate and stop attackers from within your infrastructure if you know what to look for – and if you can get out of your own way. To predict common attack tactics like use of stolen credentials, learning your organization’s topology and managing compromised systems from the internet, you need a new way to detect, investigate and respond. Watch the webinar with Bryan Lee, Unit 42 principal researcher, and Kasey Cross, senior product marketing manager, to learn: * Five tactics attackers often use to find, access and steal data * Best practices to detect and stop sophisticated attacks * Real-world examples of highly evasive as well as low-and-slow attacks You’ll learn how to identify and stop attackers by removing security silos, automating and stitching together all network, endpoint and cloud data, and moving from labor-intensive, manual tasks to automated processes with Cortex XDR™ detection and response. Join us and learn how to identify and stop attackers by removing security silos, automating and stitching together all network, endpoint and cloud data, and moving from labor-intensive, manual tasks to automated processes with Cortex XDR™ detection and response.
Related topics:

More from this channel

Upcoming talks (0)
On-demand talks (853)
Subscribers (104118)
Palo Alto Networks is the next-generation security company, leading a new era in cybersecurity by safely enabling applications and preventing cyber breaches for tens of thousands of organizations worldwide. Built with an innovative approach and highly differentiated cyberthreat prevention capabilities, our game-changing security platform delivers security far superior to legacy or point products, safely enables daily business operations, and protects an organization's most valuable assets. Find out more at www.paloaltonetworks.com or call us at 1-877-524-1031.