Detecting Advanced Threats with Event Correlation

Logo
Presented by

Joseph Hladik - Director of Services

About this talk

Determining the scope and impact of a compromise is more complex than ever before. The cost of security analysts is increasingly more expensive, and the overwhelming volume of duplicate alerts and false positives compounds the challenge SecOps teams face. In addition, encrypted network traffic further complicates the investigation. Join us for part 3 of our Detecting Advanced Threats webinar series. We’ll take you through everything you need to know to detect advanced threat actors and uncover malicious activity hiding inside encrypted traffic. This episode will detail the importance of event correlation prioritized workflows for security operations. Learn how incident response and post-eradication remediation can be improved leveraging: • Asset Risk & Threat Assessment Scoring for Response Prioritization • Automated Event Correlation • Casebook Breach Tracking
Related topics:

More from this channel

Upcoming talks (0)
On-demand talks (60)
Subscribers (2429)
Today, the network is an underlying foundation of how organizations operate. LiveAction provides end-to-end visibility of network and application performance with unmatched breadth and depth from a single pane of glass. We equip teams to address the challenges of the modern everchanging network. Tune in for best practices, how-to's, and industry news related to network monitoring, public cloud, application performance, and trends in tech.