Hi [[ session.user.profile.firstName ]]

NetOps and SecOps: Better Together

Things used to be simple. The Networking team focused on network performance and availability while Security teams dealt with threats to performance. Today, the growth of cloud, virtualization, and everything-as-a-service has changed all this, blurring the lines between NetOps and SecOps and creating a need for better alignment and sharing of data.

The experts from ExtraHop and Ixia will reveal new insights into best practices for alignment and delivering the right data—even if it’s the same data—to each team. They’ll cover:
- Changing focus and emerging challenges for networking, security, and cloud teams
- Actions to take to streamline operations
- Tips for improving performance and security
Recorded Jan 22 2019 38 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Ryan Davis, Sr. Product Marketing Manager, ExtraHop Networks and Scott Register, VP of Product Management, Ixia
Presentation preview: NetOps and SecOps: Better Together

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • Using MITRE ATT&CK In Cloud and Hybrid Environments Mar 5 2020 6:00 pm UTC 60 mins
    Vince Stross, Princ. Security SE, ExtraHop; Chip Wagner, Cybersecurity Leader, IBM; Brandon Dunlap (Moderator)
    The MITRE ATT&CK Framework provides an excellent structure for security professionals to identify the strengths and gaps in their ability to detect attacker tactics, techniques, and procedures (TTPs) in the environment. The framework is applicable for cloud, on-premises, and hybrid environments. Join ExtraHop and (ISC)² on March 5, 2020 at 1:00PM Eastern for a discussion on the MITRE ATT&CK Framework as we look at:

    • How to get the most value from the MITRE ATT&CK Framework in a hybrid environment

    • How upcoming changes in MITRE ATT&CK may affect utilization of the framework by SecOps teams

    • How MITRE ATT&CK fits into an overall framework-driven strategy for improving detection coverage and security maturity in hybrid enterprises of all sizes.
  • SANS Institute: 2020 Cybersecurity Spending Survey Panel Discussion Recorded: Feb 4 2020 58 mins
    Barbara Filkins, Research Director at SANS; John Smith, Principal Engineer at ExtraHop
    This webcast will more closely examine the results of the SANS 2020 Cybersecurity Spending Survey. A panel of sponsor representatives, led by survey author Barbara Filkins and survey advisor John Pescatore, will explore themes that emerged during the survey.

    In this webcast, Barbara Filkins and John Pescatore will provide analysis of survey results and reveal strategies that organizations can use to justify security spending.
  • Black Hat Webcast Series - Automated Threat Detection and Response Recorded: Jan 29 2020 62 mins
    Ty Miller, Managing Director at Threat Intelligence; Vince Stross, Security SE at ExtraHop Networks
    A survey of 120 Black Hat students across our Black Hat USA and Europe training courses revealed a scary statistic ... Not a single security professional in the training had the in-depth knowledge or skills to effectively carry out an incident response investigation from end-to-end to contain a breach of their organization.

    Unfortunately, this is a true representation of the state of the IT security industry today and is the fundamental reason why the bad guys are winning. Whilst we continue to use traditional security strategies, the bad guys will continue to win.

    With limited security skills, resources and budgets, the only way that your organization will survive moving forward is to modernize your security capabilities through automated threat detection and response.

    We will discuss the problem space in more detail and how you can significantly reduce the cost of a security breach by enhancing your security operations, and streamlining your threat detection, evidence collection, evidence analysis, and automated response for real-time breach containment.
  • How NDR Powers Event-Driven Security in the Cloud Recorded: Jan 28 2020 44 mins
    Ryan Davis, Senior Manager, Cloud Product Marketing & Vince Stross, Principal Security SE at ExtraHop
    For public cloud customers, event-driven security isn’t just practical—it’s expected. Although organizations still rely on perimeter-focused technologies, they’re moving away from a strictly protect-and-prevent mindset to one that includes detect-and-respond capabilities.

    In this webinar, we’ll dig into how network detection and response (NDR) can power event-driven security in the cloud. Topics will include:
    - How virtual taps enable agentless NDR in the public cloud
    - How NDR completes Gartner’s SOC Visibility Triad in the cloud
    - How NDR can be used for response automation
  • Instilling Cyber Hygiene Among Users and Creating a Culture of Cyber Safety Recorded: Dec 20 2019 59 mins
    Arun Vishwanath, President at Avant Research Group; Vince Stross, Principal Security SE at ExtraHop Networks
    Cyber security doctrines around the world have an avowed goal of improving user cyber hygiene in the workforce. But no entity within the government or in the private sector is clear about how to achieve this.

    Outside of a few thumb rules, such as, asking people to use complex passwords, no cybersecurity professional knows the behaviors that users should or shouldn’t engage in to achieve cyber hygiene.

    Often organizations find creative ways of repurposing what they are already doing—such as extending user training or using phish testing performance data—as a proxy for user cyber hygiene. This is the approach taken by the U.S. Department of Homeland Security’s Continuous Diagnostics and Mitigation program.

    But such approaches cloak the problem or attempt to reframe it, rather than address it.

    This webinar provides the missing pieces—making it possible for IT managers to better quantify the cyber hygiene levels of users and create an effective culture of cyber safety. Learn how IT managers can implement this method with existing phishing penetration testing and awareness training approaches to instill a culture of cyber safety within the enterprise. No longer does cyber hygiene have to be just a talking point. Instead, using the CHI, CSOs can measure, track, compare, calibrate—and achieve cyber hygiene.
  • A Cloud Carol: Visiting the Ghosts of Cloud Security, Past, Present, and Future Recorded: Dec 12 2019 49 mins
    Ryan Davis, Sr. Product Marketing Manager at ExtraHop Networks; Paula Musich, Research Director at EMA
    Cloud has now been around for nearly two decades, and in that time it has altered the past, present and future and sent enterprises down a new path for how IT services are delivered and how businesses view IT resources.

    While cloud is widely accepted as a business accelerator, it continues to haunt security teams who have gotten a “scrooge” reputation when it comes to cloud migration and adoption.

    In this webcast, industry analyst Paula Musich from EMA and Ryan Davis from ExtraHop will take a Dickensian journey through cloud security past, present, and future, and offer strategies for how security teams change the future state from one of cloud stall to one of cloud as a strategic security driver.
  • Unlocking Cloud-Native NDR: How Reveal(x) Cloud Secures AWS Workloads Recorded: Nov 20 2019 37 mins
    Ryan Davis, Sr. Product Marketing Manager at ExtraHop & Jeff Deininger, Principal Engineer - Cloud at ExtraHop
    Tired of stalled cloud migrations because of security concerns? Frustrated by a lack of visibility that leaves your data and applications exposed to threats?

    Join this webinar and live Q&A to see how ExtraHop Reveal(x) Cloud helps enterprises like yours secure cloud workloads and accelerate cloud migration.

    In just 30 minutes, we’ll show you how the only SaaS-based network detection and response (NDR) solution on Amazon Marketplace uses Amazon VPC Traffic Mirroring to provide complete visibility into network traffic.

    Reveal(x) Cloud deploys instantly, passively analyzes network traffic, and delivers immediate asset discovery, real-time threat detection, and machine learning-powered responses.

    Cloud-native NDR was the missing piece that prevented SecOps from completing Gartner’s SOC Cloud Visibility Triad. Learn how combining NDR, SIEM, and EDR makes it possible for SecOps to achieve a holistic approach to cloud security and eliminate the risks of misconfiguration, undetected attacks, lateral movement, and data exfiltration.
  • Cloud Security Fails of 2019 and Where to Focus in 2020 Recorded: Nov 14 2019 58 mins
    Fernando Montenegro, Principal Analyst, 451 Research and Rachel Pepple, Cloud and Security Marketer, ExtraHop
    Security has become one of the most pressing issues for organizations that are moving to the cloud. In this webinar, industry analyst Fernando Montenegro from 451 Research and Rachel Pepple from ExtraHop will take us through the cloud security journey that many enterprises have been on during the past years, looking at the realities of the high points and low points. Based on this look back, Rachel and Fernando will then pivot to what organizations can expect in 2020, where investments should be made, what trends should be closely monitored, and what best practices security teams should consider for a stronger security posture in the cloud.
  • Unlocking Cloud-Native NDR: How Reveal(x) Cloud Secures AWS Workloads Recorded: Nov 13 2019 33 mins
    Ryan Davis, Sr. Product Marketing Manager at ExtraHop & Jeff Deininger, Principal Engineer - Cloud at ExtraHop
    Tired of stalled cloud migrations because of security concerns? Frustrated by a lack of visibility that leaves your data and applications exposed to threats?

    Join this webinar and live Q&A to see how ExtraHop Reveal(x) Cloud helps enterprises like yours secure cloud workloads and accelerate cloud migration.

    In just 30 minutes, we’ll show you how the only SaaS-based network detection and response (NDR) solution on Amazon Marketplace uses Amazon VPC Traffic Mirroring to provide complete visibility into network traffic.

    Reveal(x) Cloud deploys instantly, passively analyzes network traffic, and delivers immediate asset discovery, real-time threat detection, and machine learning-powered responses.

    Cloud-native NDR was the missing piece that prevented SecOps from completing Gartner’s SOC Cloud Visibility Triad. Learn how combining NDR, SIEM, and EDR makes it possible for SecOps to achieve a holistic approach to cloud security and eliminate the risks of misconfiguration, undetected attacks, lateral movement, and data exfiltration.
  • What Works in SOC/NOC Integration: Improving Time to Detect, Respond and Contain Recorded: Nov 12 2019 55 mins
    Mitch Roberson, Director of Enterprise Systems at Curo Financial & John Pescatore, Emerging Security Trends Director at SANS
    The 2019 SANS Security Operations Center survey showed that SOC managers list lack of integration between security and IT and network operations as one of the major obstacles to both their effectiveness in dealing with evolving threats and their ability to efficiently protect the business in constrained budget environments. Less than 40% of SOC managers say that the SOC and the NOC are effectively integrated, and those who report higher levels of integration show improvement in reducing time to detect, respond and contain.

    During this SANS What Works webcast Mitch Roberson, Director for Enterprise Systems at Curo Financial, will provide details of the selection and deployment of ExtraHops Reveal(x) to increase visibility into network traffic, gaining detailed and timely insight into performance and security issues and crossing organizational siloes by using a common tool and dashboard for application owners, network administrators and security analysts.

    Join SANS Director of Emerging Security Trends John Pescatore and Mitch Roberson to hear details on the selection, deployment and experience using ExtraHop. The webcast will contain a discussion of lessons learned and best practices as well as detail the metrics used to demonstrate the value of improved email authentication and trust.
  • SANS Institute: Threat Hunting for New and Experienced Hunters Panel Discussion Recorded: Nov 4 2019 60 mins
    Matt Cauthorn, VP Sales Engineering/Security Evangelist at ExtraHop; Mathias Fuchs, Instructor at SANS
    This webcast digs more deeply into the results of the SANS 2019 Threat Hunting Survey. Survey authors Mathias Fuchs and Joshua Lemon will discuss key themes that emerged during their analysis of survey results, joined by a panel of representatives from DomainTools, ExtraHop and ThreatConnect.

    Speakers will share insights on such key issues as:
    • Threat hunting as a defined role or a function of security
    • Best practices for generating threat hunting hypotheses
    • Measuring threat hunting success
  • Unlock the Power of Network Detection and Response (NDR) in the Cloud Recorded: Oct 28 2019 34 mins
    Ryan Davis, Sr. Product Marketing Manager at ExtraHop & Amélie Darchicourt, Product Marketing Manager at ExtraHop
    Without native network visibility in the cloud, enterprises have been limited to log or agent centric tools to support their cloud migration and to secure their workloads, making it challenging to detect and investigate complex threats in a timely manner. The introduction of Microsoft Azure V-Tap and Amazon VPC Traffic Mirroring finally provides access to context-rich network data for threat detection, investigation and response.

    Join this webinar to learn how to gain visibility in your cloud workloads by leveraging the new network tap features released by the leading public cloud providers. During this session, Amelie Darchicourt and Ryan Davis, Cloud Product Marketing Managers at ExtraHop, will present the benefits of adopting a cloud-native approach to Network Detection and Response (NDR) and will share insights about how SecOps teams can hold up their side of the shared responsibility model and deliver unified security across the hybrid attack surface.
  • Diversify Defense — Improving Cybersecurity Through Smart Consolidation Recorded: Oct 15 2019 53 mins
    Jeff Costlow, Deputy CISO, ExtraHop & Craig Balding of CSA
    The rush to innovate has resulted in more sophisticated threat defenses, but it has also created a complex web of tools that must be managed by an already overworked and understaffed security team. Heterogeneity of defense systems is itself a defense, so modern security teams need to approach consolidation differently.

    In this session, Jeff Costlow, Deputy CISO at ExtraHop will give an abbreviated version of his keynote presentation at the upcoming CSA Summit at (ISC)² and share insights about how data-first approaches and cross-collaboration improve security posture and help reduce tool sprawl.
  • Nice to Have or Have to Have? The Case for Cyber Insurance Recorded: Oct 10 2019 59 mins
    John Smith, Prin. Sec. Engr, ExtraHop; Sean Scranton, RLI Cyber; William Boeck, Lockton; Brandon Dunlap, Moderator
    More and more companies are offering cyber insurance policies to help mitigate the financial losses an organization might suffer from a cyber incident. With the increase in breaches, intrusions and ransomware incidents, cyber insurance could be right for your organization as a part of the risk mitigation strategy. But there’s a lot of confusion for organizations in determining what a company’s exposure is and what exceptions and exclusions might be in a policy. Organizations are almost forced to think like an underwriter to address these concerns. Join ExtraHop and (ISC)2 October 10, 2019 at 1PM Eastern for a discussion on cyber insurance, demystifying the current insurance landscape and what are the right questions to answer.
  • ExtraHop Reveal(x) Expands Attack Investigations to Cover All Vectors Recorded: Oct 3 2019 57 mins
    Tom Stitt, Senior Director of Security Product Marketing at ExtraHop Networks and Dave Shackleford, Analyst at SANS
    ExtraHop Reveal(x) is a Network Detection and Response (NDR) system that provides machine learning-driven detection and guided investigation. ExtraHop's platform discovers and maps all connections, devices, users and dependencies in an environment, grouped by how critical they are to a business, so that everything that matters to an organization can be seen in one intuitive interface. In this SANS webcast, expert Dave Shackleford and Tom Stitt from ExtraHop, discuss how Reveal(x) can help an organization evaluate threat activity in multiple scenarios, and how key new features make doing so easier than ever. Among the features we'll explore are:

    - Interface improvements that provide better insight into the environment
    - Detections, metrics and records that reveal systemic weakness
    - Machine learning that bolsters overall security and the platform's ability to monitor and respond to threats
  • NetSecOps - Scaling Your Security Talent Recorded: Sep 30 2019 60 mins
    Tom Stitt, Senior Director of Security Product Marketing at ExtraHop Networks
    With an ever-increasing security skills gap, how do you scale your existing security resources, effectively analyze data, and decide when to act vs. when to automate response? In this webinar, Paul Asadoorian and Matt Alderman will discuss the challenges and opportunities facing security and IT teams when it comes to scaling talent. Tom Stitt, Senior Director of Security Product Marketing from ExtraHop, will discuss holistic and innovative methods of addressing the skills gap, including topics such as:

    - When to lean on the IT team to notice strange behavior on the network, plus strategies for consolidating data and tools
    - How to evaluate machine learning offerings that claim to make life easier on security analysts, but may not actually demonstrate value
    - How to determine where automated response capabilities will help your team the most, and evaluate potential tools accordingly
  • ISSA International Series: New Trends in Security - Outsourcing and Other Tech Recorded: Sep 24 2019 82 mins
    ISSA International
    As deployment models evolve so does the need for our responses. With technology such as Cloud, containers, and rapid update deployment rolling out, what's going on with security?
  • Black Hat Webcast Series: Ransomware Network Behavior and Defense Recorded: Sep 23 2019 70 mins
    Vince Stross, Principal Security SE at ExtraHop Networks; Sherri Davidoff, CEO at Brightwise & LMG Security
    Ransomware has evolved. The advance of targeted attack tools like Ryuk, Dharma and BitPaymer have paved the way for massive demands of six-figures or more. Often, criminals lurk inside corporate networks for weeks or months, analyzing financial data in order to set the ransom price. Modern ransomware strains such as Sodinokobi have exploit kits built in, enabling them to automatically spread laterally throughout a network prior to detonation.

    Advanced features include key differentiation and new tactics designed to evade your monitoring systems. Driven by the success of GandCrab and similar strains, ransomware-as-a-service is booming, with a flood of new products competing on the dark web. Other new ransomware strains have been rushed to market, resulting in sloppy coding that can accidentally render your data unrecoverable no matter what you pay.

    We’ll show you the latest ransomware in action, with videos and screenshots from actual cases, and discuss strategies for monitoring and detecting ransomware, including mistakes to avoid and tactics for thwarting the stealthiest new threats.
  • Achieving Cloud Visibility With Cloud-Native Network Detection & Response Recorded: Aug 29 2019 52 mins
    Amelie Darchicourt, Cloud Product Marketing Manager & Eric Thomas, Director of Cloud Product Marketing, ExtraHop
    Without native network visibility in the cloud, enterprises have been limited to log or agent centric tools to support their cloud migration and to secure their workloads, making it challenging to detect and investigate complex threats in a timely manner. The introduction of Microsoft Azure V-Tap and Amazon VPC Traffic Mirroring finally provides access to context-rich network data for threat detection, investigation and response.

    Join this webinar to learn how to gain visibility in your cloud workloads by leveraging the new network tap features released by the leading public cloud providers. During this session, Amelie Darchicourt, Cloud Product Marketing Manager at ExtraHop, will present the benefits of adopting a cloud-first approach to Network Detection and Response (NDR) and will share insights about how SecOps teams can hold up their side of the shared responsibility model and deliver unified security across the hybrid attack surface.
  • Best Practices for Network Security Threat Hunting with ExtraHop and Ixia Recorded: Aug 26 2019 58 mins
    Tanner Payne, Sr. Sales Engineer at ExtraHop; Greg Copeland, Director of BizDev at Ixia
    Learn how you can go beyond the traditional perimeter security provided by a firewall, IPS, etc. to actively search for threats that have infiltrated your network.

    Threat hunting looks at data at rest (e.g. data lakes) and at data on the move (i.e. the data flowing in and out of servers). This capability allows you to deploy a solution to either analyze data in real-time or at a later date to determine if your network has been compromised.

    This webinar will define the benefits of threat hunting and best practices for deployment of threat hunting.
Automating and streamlining security investigations.
This channel provides educational webinars about security analytics and investigation automation, and product info about ExtraHop Reveal(x), the network security analytics platform powered by AI, providing unprecedented visibility, advanced behavioral analytics, and investigation automation capabilities. Using real-time analytics and ML-driven anomaly detection, ExtraHop Reveal(x) enables security teams to accelerate investigations, reduce false positives, and optimize the capabilities of expert security analysts. To learn more visit www.extrahop.com/revealx

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: NetOps and SecOps: Better Together
  • Live at: Jan 22 2019 7:40 pm
  • Presented by: Ryan Davis, Sr. Product Marketing Manager, ExtraHop Networks and Scott Register, VP of Product Management, Ixia
  • From:
Your email has been sent.
or close