Guy Raz,Prin Eng/ExtraHop;Kuldeep Beniwal IAM Architect, LendingClub; Richard Israelite Sr Dir,Addepar;Dunlap, Moderator
Firewalls and endpoint agents only protect part of your risk surface. By leveraging several sources of network telemetry — including packets, flow logs, DNS logs, and more — security teams can take a multi-layered approach to visibility, threat detection, and investigation to defend cloud assets against advanced threats.
Join (ISC)² and Extrahop on November 17 at 1:00 p.m. eastern / 10:00 a.m. pacific as we discuss Network Telemetry as a key component of an effective defense-in-depth strategy to enhance cloud security. We will explore best practices that enable your organization to identify indicators of compromise so you can investigate and respond to threats that successfully bypass perimeter and endpoint defenses.