ExtraHop #1: How To Stop Breaches Faster with Integrated NDR & EDR

Logo
Presented by

Chase Snyder, Sr. Security Product Marketing Manager, ExtraHop; Dixon Styres, Solutions Architect, Crowdstrike; Sharon Smith

About this talk

Defending against advanced threats requires advanced insights from the three foundational data sources for security operations: endpoint data, log data, and the network. In the first part of a three-part series, we'll discuss: ·advanced threat behaviors, how they gain access to the network through both commonplace and sophisticated means, how they act once they're inside. ·how to leverage the three foundational data sources, integrated into a best-of-breed XDR approach to detect and investigate advanced threats like supply chain attacks, insider threats, and more ·how to rapidly respond to minimize the blast radius and reduce business impact when an advanced threat gets inside.
Related topics:

More from this channel

Upcoming talks (13)
On-demand talks (442)
Subscribers (134445)
ISC2 Security Briefings brings attendees both stand alone webcasts and multi-part series on cutting edge infosecurity topics that gets deeper into the subject matter and technologies presented by subject matter experts.