Ransomware Best Practices: Agentless Threat Hunting

Logo
Presented by

Chris Borales, Sr. Product Marketing Manager - Gigamon

About this talk

Originally aired on an ActualTech Media webcast. Threats are getting better at evading perimeter defenses, that’s a given. After they’ve gotten in, they’re hiding in network blind spots, operating using encrypted traffic and targeting cloud workloads. How do you find adversaries after they’ve bypassed your perimeter and evaded endpoint agents? Attend this webinar to learn the most effective techniques for dealing with the scourge of ransomware. You’ll hear about the tools you could be using to bolster your defenses and learn about best practices for stopping ransomware attacks. In this session, Chris Borales will discuss the myriad opportunities SOC teams have to hunt for attackers and how improving network visibility, extended network metadata retention are among your best tools to pinpoint adversary activity.
Related topics:

More from this channel

Upcoming talks (6)
On-demand talks (193)
Subscribers (26911)
Gigamon® offers a deep observability pipeline that efficiently delivers network-derived intelligence to cloud, security, and observability tools. This helps eliminate security blind spots and reduce tool costs, enabling you to better secure and manage your hybrid cloud infrastructure. Gigamon has served more than 4,000 customers worldwide, including over 80 percent of Fortune 100 enterprises, 9 of the 10 largest mobile network providers, and hundreds of governments and educational organizations.