Ransomware Best Practices: Agentless Threat Hunting

Logo
Presented by

Chris Borales, Sr. Product Marketing Manager - Gigamon

About this talk

Originally aired on an ActualTech Media webcast. Threats are getting better at evading perimeter defenses, that’s a given. After they’ve gotten in, they’re hiding in network blind spots, operating using encrypted traffic and targeting cloud workloads. How do you find adversaries after they’ve bypassed your perimeter and evaded endpoint agents? Attend this webinar to learn the most effective techniques for dealing with the scourge of ransomware. You’ll hear about the tools you could be using to bolster your defenses and learn about best practices for stopping ransomware attacks. In this session, Chris Borales will discuss the myriad opportunities SOC teams have to hunt for attackers and how improving network visibility, extended network metadata retention are among your best tools to pinpoint adversary activity.
Related topics:

More from this channel

Upcoming talks (1)
On-demand talks (308)
Subscribers (22509)
Gigamon offers a deep observability pipeline that harnesses actionable network-level intelligence to amplify the power of observability tools. This powerful combination enables IT organizations to assure security and compliance governance, speed root-cause analysis of performance bottlenecks, and lower operational overhead associated with managing hybrid and multi-cloud IT infrastructures.