Pro-Active Intruder Hunting – Part 2

Logo
Presented by

Bruce Roton: CISSP, CISA, CISM, CIPP/US, C|EH, C|CISO, CRISC, ISO-27001, CGEIT, CSSGB(IT), ITIL, CSMCP

About this talk

In the last decade, it has been a common axiom of cyber security that it is not a question of if an organization’s defenses will be breached, but only of when. And while cyber-attacks and data breaches are always business disrupting, they can also be very costly. Therefore, Time to Detection and Time to Effective Respond have become critical measurements for the success of any organization’s cyber security program. This is the second webinar in a 2-part series where we'll delve deeper into the issues and processes of intruder detection, from first response through intruder eviction and remediation.
Related topics:

More from this channel

Upcoming talks (0)
On-demand talks (62)
Subscribers (5262)
Transforming the world’s best companies through the power of technology. For more than 20 years, UST has worked side by side with the world’s best companies to make a real impact through transformation. Powered by technology, inspired by people and led by our purpose, we partner with our clients from design to operation. Through our nimble approach, we identify their core challenges, and craft disruptive solutions that bring their vision to life. With deep domain expertise and a future-proof philosophy, we embed innovation and agility into our clients’ organizations—delivering measurable value and lasting change across industries, and around the world. Together, with over 26,000 employees in 25 countries, we build for boundless impact—touching billions of lives in the process. Visit us at ust.com.