How to Find the Real Threat Lurking in Security Events

Presented by

Damon Fleury, CTO, Chris Rogers, Virtual SOC Leader

About this talk

For most security pros, the challenge isn’t not having enough data about potential security events. The problem is so much data coming from millions of endpoints that the real threat is buried and undetectable. The companies that have recently experienced high profile breaches have learned it’s easy for a real threat to go unrecognized and wreak devasting havoc on your systems, your customers and your business. Ray Bradbury was right when he said, “Too much of anything isn’t good for anyone.” Is it possible to efficiently sift through the mountains of security alert data collected daily to hone in on what indicates a real incident? And even more importantly, is it possible to accomplish this quickly enough to be able to immediately mitigate the potential damage? Fortunately, the answer to these questions is “Yes, it is possible.” Join CyberDefenses CTO Damon Fleury for a webinar in which we explore the threat hunting methodologies and tools that enable you to identify the true threats lurking in your security alerts, and to recognize them early enough to take effective action. We’ll cover: •Setting up a process that works to isolate the potential threats •The skillset needed to determine what warrants immediate attention •The typical structure of an incident and tell-tale markers •Best practices for threat hunting and detection •Effective incident response workflows and resources

Related topics:

More from this channel

Upcoming talks (0)
On-demand talks (7)
Subscribers (647)
CyberDefenses is a premier cybersecurity services firm, specializing in assessments and leading edge services since 2001. CyberDefenses' experts share their experience on a variety of different topics including security operations, threat intelligence, identity management, privacy protection and security compliance. www.cyberdefenses.com