Factoring IoT Devices into Detection and Response: A SANS Whitepaper

Logo
Presented by

Michael Sanders, Cloud Security Engineer at ExtraHop Networks; Matt Bromiley, Digital Forencis and IR Director at SANS

About this talk

IoT is growing in the enterprise and becoming of greater concern as an unprotected threat vector. An organization needs to understand if and how enterprise IoT devices like smart TVs, badge scanners, projectors, whiteboards, and printers, as well as unknown rogue devices, have been connected to the network. - Is your security team aware of every enterprise IoT device that sits in an office, lobby, conference room, or boardroom? - Have you completed an assessment of the network security risks from unmanaged, nonstandard devices? - Is there a plan for detecting and responding to malicious traffic if IoT devices are compromised? This webinar explores the growth of enterprise IoT devices and the implications for incident detection and response. The enterprise device landscape is constantly changing; your information security team must adopt practices to easily adapt. With the right approach, your team can quickly identify IoT devices for greater visibility to detect and respond to any new threats that come their way.

Related topics:

More from this channel

Upcoming talks (0)
On-demand talks (201)
Subscribers (10445)
The prevention and protection model of cybersecurity isn’t working: between the cloud, IoT, and the sheer pace of change, the enterprise is no longer built to be walled in. This channel provides educational webinars to help SecOps (SOC) and NetOps (NOC) teams, from CIOs and CISOs to analysts and practitioners, change their perspective in order to identify, investigate, and respond to threats across the modern attack surface. We explore how cloud-native network detection and response (NDR) provides the complete visibility, real-time threat detection, and intelligent response you need to secure your hybrid environment. You’ll also find product information about ExtraHop Reveal(x) which enables you to: Eliminate blind spots: Cover 100% of your hybrid environment, Detect what matters: Find threats 95% faster, and Act quickly: Respond to breaches 70% faster. Learn more at www.extrahop.com