We're Going on a Threat Hunt

Logo
Presented by

George Sanford, Josh Day, and Chris Borales

About this talk

Is the thought that threat actors could be hiding under your bed, in your closet, or having a wild rumpus in your network keeping you up at night? Does the thought of bad guys hiding in plain sight make every day a terrible, horrible, no good, very bad day? Even though your network should be a safe place, breaches are inevitable. Come along as we take a whimsical but serious approach to thinking about looking for evil-doers in your environment. You’ll learn how to find the signs of attacker activity “stumble-trip” style – by looking for clues and indicators beyond just detections and signatures. You’ll learn about the tools you’ll need to spot attacker behavior before they can wreak havoc. ____ This session originally aired during Gigamon Visualyze Boot Camp
Related topics:

More from this channel

Upcoming talks (1)
On-demand talks (302)
Subscribers (22447)
Gigamon offers a deep observability pipeline that harnesses actionable network-level intelligence to amplify the power of observability tools. This powerful combination enables IT organizations to assure security and compliance governance, speed root-cause analysis of performance bottlenecks, and lower operational overhead associated with managing hybrid and multi-cloud IT infrastructures.