Hi [[ session.user.profile.firstName ]]

Ransomware Loitering Presents an Opportunity for Network Detection

The recent surge of ransomware attacks has highlighted a shift in tactics employed by threat actors looking to extort organizations. Their methodology has changed from a quick, opportunistic attack to a prolonged, targeted approach. This shift presents threat groups with the opportunity to encrypt more critical data, but also presents security teams with the opportunity to detect activity before data is encrypted.

In this technical webinar, we explore how this allows security analysts to use network detection and response capabilities to discover malicious activity between initial compromise and encryption.
Recorded Oct 15 2020 43 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Steve Porcello - Sr. Sales Engineer, Gigamon ThreatINSIGHT
Presentation preview: Ransomware Loitering Presents an Opportunity for Network Detection

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • Understanding TLS Decryption: Deploy Your Solution Nov 9 2021 5:00 pm UTC 42 mins
    Greg Maples, Consulting Security Architect at Gigamon
    The final webinar in our three-part Tech Talk series on TLS Decryption provides practical advice on how to seamlessly deploy a decryption solution to effectively combat malware threats from encrypted traffic.

    You’ll learn everything you need to know about implementation, including:
    • Planning
    • Validation
    • Integration
  • Understanding TLS Decryption: Design Your Solution Nov 2 2021 4:00 pm UTC 58 mins
    Ian Farquhar, Consulting Sales Engineer at Gigamon
    This Tech Talk webinar on designing a decryption solution to reduce malware threat is the second in a three-part series on TLS Decryption.

    You’ll learn how to create a solution that centrally decrypts encrypted traffic to eliminate blind spots, frees up tools capacity and complies with privacy needs, including:
    • Requirements
    • Architectures
    • Best practices
  • Understanding TLS Decryption: Getting It Right Oct 26 2021 4:00 pm UTC 58 mins
    Ollie Sheridan, Principal Sales Engineer at Gigamon
    This Tech Talk webinar on understanding how to get decryption right is the first in a three-part series on TLS Decryption.

    With increased malware threats using encryption, winning the battle against malware threats requires getting decryption right.
    In this technical webinar, Gigamon experts explain how to use TLS Decryption to thwart attacks by eliminating blind spots and reducing the attack surface.

    Tune in to learn how to attain North-South and East-West traffic visibility, including:
    • Drivers
    • Challenges
    • Approaches
  • Cloud Visibility, Monitoring and Security Recorded: Sep 21 2021 50 mins
    Gigamon Cloud Team
    Hybrid cloud environments are complex — and harder to secure.

    In this third webinar of a three-part series, Gigamon experts share insights on how to monitor and secure your new hybrid cloud network and datacenter.
    Plus, they offer insights on the importance of cloud visibility and how to achieve it across your network.

    Presented by:
    * Baseer Balazadeh, Senior Technical Marketing Engineer
    * Jim Mandelbaum, Field CTO
    * Guy White, Consulting Sales Engineer
    * LaFon Hamilton, Sales Engineer

    Sign up for the 2 other webinars of the series:
    * Cloud Strategy
    * Cloud Migration and Deployment

    + The first 25 attendees will receive a $50 Amazon gift card!
  • Cloud Migration and Deployment Recorded: Sep 8 2021 43 mins
    Gigamon Cloud Team
    What is involved with shifting to the cloud?

    In the second webinar of a three-part series on cloud migration, Gigamon experts dig a little deeper to discuss the ins-and-outs of cloud integration and cloud automation. They also provide strategies and best practices for executing a successful move to the cloud.

    Presented by:
    * Baseer Balazadeh, Senior Technical Marketing Engineer
    * Jim Mandelbaum, Field CTO
    * Guy White, Consulting Sales Engineer
    * LaFon Hamilton, Sales Engineer

    Sign up for the 2 other webinars of the series:
    * Cloud Strategy
    * Cloud Visibility, Monitoring and Security

    + The first 25 attendees will receive a $50 Amazon gift card!
  • Cloud Strategy Recorded: Aug 24 2021 41 mins
    Gigamon Cloud Team
    Confused or overwhelmed by cloud migration?

    In the first of this three-part webinar series, Gigamon experts break down what cloud migration actually means.
    You’ll gain insights on when and why you should migrate to the cloud, how to choose a cloud provider, and key considerations to keep in mind as you develop a cloud strategy.

    Presented by:
    * Baseer Balazadeh, Senior Technical Marketing Engineer
    * Jim Mandelbaum, Field CTO
    * Guy White, Consulting Sales Engineer
    * LaFon Hamilton, Sales Engineer

    Sign up for the 2 other webinars of the series:
    * Cloud Migration and Deployment
    * Cloud Visibility, Monitoring and Security
  • Sharpening Your Focus: Effective Pivots From ThreatINSIGHT Observations Recorded: Jun 15 2021 56 mins
    Gigamon Technical Success Team
    Expanding on using Gigamon ThreatINSIGHT™ observations to kickstart your investigation and hunting efforts, this session provides a refresher on using observations and demonstrates how to effectively pivot from ThreatINSIGHT observations to discover anomalies and potentially malicious behavior in your environment.
  • Automation — Ansible for 5G Recorded: May 13 2021 25 mins
    Kiet A. Duong, Consulting Sales Engineer, Gigamon
    Due to the scale of 5G core, CUPS architecture, and the number of systems that need to be configured to effectively manage the 5G traffic, using a point-and-click GUI or CLI for initial configuration and ongoing maintenance of the visibility fabric can be very laborious and error prone.

    At this session we will dive into the use of YAML and Ansible scripting for automation of these and other tasks.

    Note: CPE credits not offered for on demand sessions.
  • Handling Encrypted Traffic in 5G Recorded: May 13 2021 25 mins
    Ryan Mahoney, Product Management Director, Service Providers, Gigamon
    5G standards were designed with the use of ephemeral key-based encryption.

    With the scale of devices, volume of traffic, and virtualization in the 5G core, the ability to gain visibility into the encrypted traffic for effective performance monitoring and security can be quite difficult.

    In this session we will explore some of the options for avoiding these challenges.
  • Automation in Telco Networks Recorded: May 13 2021 22 mins
    Andy Burrell, Head of Portfolio Marketing, Nokia
    Join this session to discover how communication service providers (CSPs) from around the world are automating network and service operations.

    We will reveal the most successful strategies that CSPs have adopted, and how automation can reduce operating costs and manage complexity.

    70% of the CSPs surveyed have a strategy to grow revenues from services that extend beyond connectivity and automation will play an integral role in bringing new services to market, faster.
  • Automation — Ansible Recorded: May 13 2021 28 mins
    Sriram Kallidaikurichi, Principal Solutions Engineer, Gigamon
    Automation is no longer a nice-to-have in today's IT environment.
    Through the use of YAML, automation means faster deployment, easier integration, and less manual work and errors.

    At this session we will demonstrate how Gigamon supports Ansible, walk through use cases, and show how you can implement Ansible at your site.

    Note: CPE credits not offered for on demand sessions.
  • Cloud Network Metadata: A Guide to Using Metadata for Monitoring and Security Recorded: May 13 2021 26 mins
    Bassam Khan, VP of Product and Technical Marketing, Gigamon / Muhammad Durrani, Technical Marketing Manager, Gigamon
    Networks communications carries a wealth of information from physical, virtual and cloud platforms. For app monitoring and security, network metadata brings new potential to observability tools, which are mostly reliant on logs, traces and metrics.

    At this session we will see how metadata can be extracted from network traffic, and we will examine some metadata use cases using observability tools, and mining raw metadata using AWS S3 with ELK Stack and Athena. We will close with a live demo of Gigamon and DataDog concept integration.

    Note: CPE credits not offered for on demand sessions.
  • Using ThreatINSIGHT Like a Pro Recorded: May 13 2021 32 mins
    Gene Berger, Sr. Sales Engineer, Gigamon ThreatINSIGHT, Gigamon
    Come see how efficient and sophisticated SOCs use ThreatINSIGHT to close the SOC visibility gap, identify active threats along the MITRE ATT&CK framework with certainty, and perform rapid threat hunting/investigations that yield robust incident-response actions.
  • Cloud Migration Journey Recorded: May 13 2021 31 mins
    Min-Hsao Chen, PE, CISSP, Sales Engineer, Gigamon
    Come join us in exploring the cloud migration journey and some of the common challenges that we face during this journey.

    We will be sharing some current experiences of visibility challenges and expectations.
  • Cloud Automation — Terraform Recorded: May 13 2021 30 mins
    Baseer Balazadeh, Sr Technical Marketing Engineer, Gigamon
    It's all about AUTOMATION!!!

    Build the script once, deploy as many times as needed.

    In this session we'll go over Terraform to provide a hands-on ""show and tell"" on how to quickly and easily expand your footprint using automation languages.

    Note: CPE credits not offered for on demand sessions.
  • Does the Datacenter and the Core Network Have a Future in a Cloudy World? Recorded: May 13 2021 61 mins
    Session Moderator: Shane Buckley, President and COO, Gigamon
    The datacenter and core network continue to thrive in a world that we are continually told is moving to the cloud.

    Many CIOs, CISOs and experts believe that the datacenter will continue to play a critical role as IT faces ever-increasing volume, variety and velocity of data; connectivity to millions of users, processes, managed and unmanaged devices especially in the face of unprecedented levels of cyber-terrorism, malware and ransomware.

    Join your executive peers in a one-hour private session to discuss the role and value of the datacenter and corporate networks in the coming decade.

    •How will the concept and role of the datacenter evolve?
    •What workloads belong in the datacenter and what drives this determination?
    •What are the best-practices to ensure effective cloud and datacenter interoperability?
    •Is the datacenter the security and compliance hub of the enterprise?
    •Are the roles of the datacenter and centralized IT inextricably linked?

    Panelists
    •Bob Laliberte, Analyst, ESG
    •Vince Berk, CTO, Riverbed
    •Mike Hoyt, SVP Eng & Ops, WeLink
    •Darrin Good, Director of Business Development, Enterprise Networking and Security, Compunet
    •Michael Dickman, Chief Product Officer, Gigamon
  • Security Starts with Visibility Recorded: May 13 2021 26 mins
    Jamison Utter, Sr Director of Product and Solutions Evangelism, Ordr
    Delivering security in the hyper converged Cyber-Physical era is imperative.

    Learn the nature and rationale for cloud-to-ground visibility and network control in the hyper converged IoT world of Digital business.

    We will explore the cause and effect of hyper convergence and some industry examples of how and why cloud-to-ground are used. We will conclude by sharing seven steps to implement a convergence plan in your enterprise.
  • Cloud Visibility in the Age of Zero Trust Recorded: May 13 2021 20 mins
    Martin Holste, CTO, Cloud, FireEye, Inc.
    When you think of cloud visibility, you may think of getting packet traces from hard-to-reach places, audit logs, or network flow records.

    The truth is that it takes all of these things to know what’s happening in your cloud, especially when network perimeters erode, and you find yourself in a zero trust world.

    At FireEye, we see first-hand everyday how attackers steal credentials and penetrate networks. This session will show how to create visibility for a defensible network so you can start gaining some trust back.
  • What 5G Means for the Enterprise Recorded: May 13 2021 31 mins
    David Anderson, Senior Sales Engineer, Federal Team, Gigamon
    Isn't 5G just for service providers?

    Well, it was designed originally with mobile service providers in mind, but it's just as applicable for other network service providers.

    There's also a lot of interest from many large enterprises and governmental organizations to be able to deploy their own private 5G networks. Join us as we explore this topic.

    Note: CPE credits not offered for on demand sessions.
  • App Intel: Elevate Application Visibility and Metadata Generation Recorded: May 13 2021 30 mins
    Chetan Shah, Product Management, Gigamon / John Gudmundson, Product Marketing, Gigamon
    To fully visualize network traffic and optimally distribute to the right tools with contextual insights, you need to automatically identify and selectively filter thousands of applications and derive app-aware metadata.

    Only then can you ensure tool effectiveness with reduced scaling while driving enhanced security and superior user experiences.

    Note: CPE credits not offered for on demand sessions.
For security and network operations teams
Learn more about your Gigamon products and features, how they work, and how you can optimize your usage to maximize network performance and security.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Ransomware Loitering Presents an Opportunity for Network Detection
  • Live at: Oct 15 2020 12:45 am
  • Presented by: Steve Porcello - Sr. Sales Engineer, Gigamon ThreatINSIGHT
  • From:
Your email has been sent.
or close