Originally aired on an ActualTech Media webcast.
Threats are getting better at evading perimeter defenses, that’s a given. After they’ve gotten in, they’re hiding in network blind spots, operating using encrypted traffic and targeting cloud workloads. How do you find adversaries after they’ve bypassed your perimeter and evaded endpoint agents?
Attend this webinar to learn the most effective techniques for dealing with the scourge of ransomware. You’ll hear about the tools you could be using to bolster your defenses and learn about best practices for stopping ransomware attacks. In this session, Chris Borales will discuss the myriad opportunities SOC teams have to hunt for attackers and how improving network visibility, extended network metadata retention are among your best tools to pinpoint adversary activity.