Is the thought that threat actors could be hiding under your bed, in your closet, or having a wild rumpus in your network keeping you up at night? Does the thought of bad guys hiding in plain sight make every day a terrible, horrible, no good, very bad day?
Even though your network should be a safe place, breaches are inevitable. Come along as we take a whimsical but serious approach to thinking about looking for evil-doers in your environment. You’ll learn how to find the signs of attacker activity “stumble-trip” style – by looking for clues and indicators beyond just detections and signatures. You’ll learn about the tools you’ll need to spot attacker behavior before they can wreak havoc.
____
This session originally aired during Gigamon Visualyze Boot Camp