Detecting Advanced Threats – The Active Threat Inside Your Network

Logo
Presented by

Dr. Andrew Fast - Chief Data Scientist

About this talk

Many of the headline cyber attacks are still occurring against on-premise systems. Despite organizations moving production workloads to the cloud, attackers are leveraging phishing and stolen credentials for remote access into organizations, and they will get in. Future proofing your encrypted traffic strategy should include ETA visibility from the core, to the edge, and in multi-cloud, to identify threats actively operating inside your environment. Join us for part 2 of our Detecting Advanced Threats webinar series, where we’ll take you through everything you need to know for detecting advanced threat actors and uncovering malicious activity hiding inside encrypted traffic. This episode will detail the importance of advanced behavioral analysis to identify threat actor activity operating inside your network. With major attacks, threat actors operate inside the network for a period of time before, sometimes weeks, before successfully executing their attack. Learn how behavioral analysis can be applied to identity threat activity such as: o Reconnaissance o Lateral Movement o Data Staging o Data Exfiltration

Related topics:

More from this channel

Upcoming talks (1)
On-demand talks (59)
Subscribers (2203)
Today, the network is an underlying foundation of how organizations operate. LiveAction provides end-to-end visibility of network and application performance with unmatched breadth and depth from a single pane of glass. We equip teams to address the challenges of the modern everchanging network. Tune in for best practices, how-to's, and industry news related to network monitoring, public cloud, application performance, and trends in tech.