Detecting and Stopping Online Attacks

Logo
Presented by

Joan Goodchild - Dark Reading ; John Sawyer - IOActive, Inc. ; Dmitriy Ayrapetov - SonicWall

About this talk

Today’s cyber attackers can compromise your systems using a variety of methods, from well-disguised malware to sophisticated, targeted exploits aimed right at your company. How can you identify these attacks quickly and respond effectively? In this Dark Reading webinar, top experts discuss executive strategies and actionable methods your security operations team can use to detect different types of attacks and trigger a quick, effective response. Hear from Joan Goodchild, Senior Editor, Dark Reading, John Sawyer, Associate Director of Services IOActive, Inc. and Dmitriy Ayrapetov, Vice President Platform Architecture, SonicWall — our panelists will discuss: • Methods cyber attackers often use to compromise your systems • Tips to recognize well-disguised malware used in targeted exploits • Actionable advice on how to respond quickly and effectively to attacks • Understand how your security operations team can use actionable insight and methods for a quick response
Related topics:

More from this channel

Upcoming talks (20)
On-demand talks (450)
Subscribers (31700)
SonicWall is a cybersecurity forerunner with more than 30 years of expertise and is recognized as the leading partner-first company. With the ability to build, scale and manage security across the cloud, hybrid and traditional environments in real-time, SonicWall provides seamless protection against the most evasive cyberattacks across endless exposure points for increasingly remote, mobile and cloud-enabled users. With its own threat research center, SonicWall can quickly and economically provide purpose-built security solutions to enable any organization—enterprise, government agencies and SMBs—around the world. For more information, visit www.sonicwall.com or follow us on Twitter, LinkedIn, Facebook and Instagram.