InfoTechTarget and Informa Tech's Digital Businesses Combine.

Together, we power an unparalleled network of 220+ online properties covering 10,000+ granular topics, serving an audience of 50+ million professionals with original, objective content from trusted sources. We help you gain critical insights and make more informed decisions across your business priorities.

Protecting Your Cloud Presence by Analyzing Network Activity

Presented by

Guy Raz,Prin Eng/ExtraHop;Kuldeep Beniwal IAM Architect, LendingClub; Richard Israelite Sr Dir,Addepar;Dunlap, Moderator

About this talk

Firewalls and endpoint agents only protect part of your risk surface. By leveraging several sources of network telemetry — including packets, flow logs, DNS logs, and more — security teams can take a multi-layered approach to visibility, threat detection, and investigation to defend cloud assets against advanced threats. Join (ISC)² and Extrahop on November 17 at 1:00 p.m. eastern / 10:00 a.m. pacific as we discuss Network Telemetry as a key component of an effective defense-in-depth strategy to enhance cloud security. We will explore best practices that enable your organization to identify indicators of compromise so you can investigate and respond to threats that successfully bypass perimeter and endpoint defenses.
ISC2 Think Tank

ISC2 Think Tank

164905 subscribers206 talks
Moderated roundtable discussions on a variety of infosecurity topics.
ISC2 hosts regular panel discussions on hot button infosecurity topics featuring thought leaders and visionaries from the industry who answer questions from the audience.
Related topics