Cybersecurity Judo: Using the Adversary’s Strength Against Them

Logo
Presented by

Chris Borales, Sr. Product Marketing Manager - Gigamon

About this talk

Originally aired as an iSMG webcast. Perimeter defenses are nothing new, and when it comes to cybercriminals and ransomware purveyors, they’re getting better at evading perimeter defenses. Once they’ve gotten in, they’re hiding in network blind spots, operating using encrypted traffic and targeting cloud workloads. What if you could turn this behavior to your advantage? View this webinar OnDemand now, and learn from the discussion on how to use these attackers’ strength against them and how SOC teams should hunt for attackers while leveraging network visibility and network metadata. Topics include: - How network packet data is the best way to detect early signs of compromise - Why complex infrastructures indicate that blind spots are only getting worse - How network detection and response (NDR) tools are the best to fight ransomware

Related topics:

More from this channel

Upcoming talks (9)
On-demand talks (261)
Subscribers (17517)
Gigamon offers a deep observability pipeline that harnesses actionable network-level intelligence to amplify the power of observability tools. This powerful combination enables IT organizations to assure security and compliance governance, speed root-cause analysis of performance bottlenecks, and lower operational overhead associated with managing hybrid and multi-cloud IT infrastructures.