Conquering Challenges of Incident Response: Real-Time Hunting and Response

Presented by

Stephen Jones, Director of Managed Services, GuidePoint Security; Justin Scarpaci, Technical Solutions Lead, Carbon Black

About this talk

Are you an information security professional struggling with labor-intensive and slow-moving incident response processes? According to a recent Enterprise Strategy Group survey, more than 60 percent of information technology professionals say their organization has taken steps to automate incident response, but 91 percent say the processes are not very effective or efficient. The problem? Information security teams are limited by time and have too many manual processes. Join GuidePoint Security and Carbon Black for “Conquering Challenges of Incident Response: Real-Time Incident Hunting and Response,” a free, interactive webinar at 2:30 p.m. Thursday, Nov. 17. Together, we will explore: Cost-efficient and time-saving solutions to help your team monitor your environment Tools to help you hunt for and find potential attacks, quarantine them, and react before real damage is done Learn from real-world analysts and incident responders who know firsthand just how challenging incident response can be. We’ll show you how to leverage today’s threat-hunting tools to: - Hunt for incidents in real time - Visualize a complete attack kill chain - Efficiently defend your environment - Monitor endpoints around-the-clock for attacks based on Patterns of Compromise (POCs) - Secure devices on or off network - Review continuously recorded histories of endpoint activity - Quickly conduct comprehensive investigations and identify threat activity - Minimize data loss and potential impact on your organization - Deploy rapid response and remediation services Who Should Attend: - Information security professionals struggling with effective incident response because of limited time and resources - Current MSSP customers not satisfied with their current provider(s) - Information security professionals wanting to improve the effectiveness of their logging and monitoring and/or vulnerability management programs

Related topics:

More from this channel

Upcoming talks (0)
On-demand talks (8)
Subscribers (1032)
GuidePoint Security