The average dwell time of a network intrusion lasts an average of 197 days before discovery, according to a Ponemon Institute study. During that window, there are key moments where the attackers take an action that might alert you to their presence. If you notice it, then you can mitigate the attack before it’s too late. But uncovering these indictors of compromise within your environment requires visibility into all network packets and endpoint processes running within, plus an understanding of what tactics, techniques and procedures (TTPs) to look out for -- from early stage intrusion and reconnaissance to lateral movement all the way to a final-stage malware or ransomware attack.
This webcast will:
• Reveal the telltale signs of a breach across various phases of the attack chain, using MITRE ATT&CK as a framework
• Lay out the tools, techniques and strategies needed to detect advanced threat actors within your network, including network/endpoint detection and response