Jim Ambrosini, Managing Director, CohnReznick and Tony Thompson, GM Threat Detection, SS8
Most companies list cyber security as one of their top priorities. Many have implemented various technologies and increased headcount to protect their digital assets and comply with regulations. However, despite making these investments, they continue to struggle with identifying a breach and knowing what to do or how to respond when it happens. In this Webinar, “The Fly in the Cyber Ointment – The Ability to Identify and Assess Indicators of Compromise,” cyber security risk expert Jim Ambrosini from CohnReznick will join Tony Thompson from SS8 Networks to discuss current trends in cyber security, the evolving threat landscape and present best practices on how to identify and respond to breaches.
Tony Thompson, General Manager, Threat Detection, SS8 Networks
Unless you’ve been under a rock, you know that breaches continue to occur at an alarming rate. Despite massive investments in security technology, today’s organizations remain challenged to protect their infrastructure against the most advanced threats. The pendulum continues to swing in a cyber war between hackers and those defending critical systems. What’s the common denominator? The Network. While it’s exploited by attackers to perform reconnaissance, compromise systems and exfiltrate data, it also provides a source of truth about malicious activity. This webinar will explore five key indicators that your network may have been breached and what you should expect to see from a network risk assessment.
Mike Rothman, Securosis Analyst/President; Faizel Lakhani, SS8 COO/President
What happens when you combine increasingly effective adversaries, data dispersing to the clouds, and a significant lack of skilled security practitioners? You get the future of incident response.
Despite having a bigger budget and better tools than ever before, the underlying way incident response happens within enterprises must evolve with the times.
Join Mike Rothman, an analyst at Securosis & Faizel Lakhani, COO at SS8 as they discuss trends in cyber attacks and incident response. Learn what you can do today to ensure your organization is ready for the changes already in motion, and how network visibility plays a crucial role in accelerating breach and incident response.
A brief introduction to the SS8 BreachDetect solution. Featuring a simple, visual UI, SS8 BreachDetect allows analysts to quickly view automated threat alerts, drill deeper into what triggered those alerts, and create custom queries and dashboards to investigate suspicious network activity and devices of interest.
Tony Thompson, Vice President; Rajdeep Wadhwa, Product Management
Cyber threats are more sophisticated than ever, slipping past perimeter defenses and hiding in the normal flow of network communications. For all you GOT fans, it’s a lot like Wildlings slipping past The Wall.
Data breaches are going undetected for more than 200 days, and in most cases, the breached company learns about the breach from outside their organization. What’s the common denominator? The Network. Much like the North, the network remembers.
A lack of high-definition network visibility has extended the breach detection window and prolonged data breach investigations. New methods of network visibility, learning analytics and automation are now available to accelerate and simplify the breach-hunting journey – past, present and future.
In this webinar, we will examine:
• Why IT and cyber security organizations today struggle with breach detection and investigations
• Why legacy approaches to analyze network traffic (SIEM, packet recorders, network forensics) are extending and complicating cyber investigations, and
• A new “time machine” model of network security analytics that accelerates the breach detection and incident response workflow
This event will also look at the architectural considerations and investment required for implementing this new model of network-based breach detection, as well as examples of the types of threats that can be discovered after the threat slips past preventative security measures, such as firewalls, anti-virus and intrusion prevention.
SS8 is a time machine for breach detection. By applying today's knowledge to history, SS8 finds breaches now you did not know about before. Proven with the world's top intelligence agencies and built for the enterprise, SS8 provides unprecedented content- and context-aware communications insight to easily find the threats that matter most.